NIST SP 800-171 Control 3.13.1 / CMMC Practice SC.1.175 requires us to "Monitor, control, and protect organizational communications (i.e., information
What Does the Term “Basic” Mean in Relation to DoD Contractor Cybersecurity
We've noticed some confusion from our clients stemming from the various ways the DoD uses the term "Basic" in conjunction with its supply chain
POAMs in a Nutshell
When a Quick Fix Just Isn't Possible Security standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC) provide common
The CMMC vs other Cybersecurity Frameworks
The Cybersecurity Maturity Model Certification (CMMC) was designed to improve the security posture of the Defense Industrial Base. In developing the
The Cyber Risk of USBs
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word
CMMC Preparation Methodology executed by Totem Technologies
Totem Technologies' Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and
How to generate and report your DoD Self Assessment score
Overview of the DoD Self-Assessment Requirement In a proposal published in the Federal Register, the DoD has outlined a new setof rules it wants
Understanding Malware as a Service
History of Cyber Crime Cybercriminals are increasingly embracing a service-based economy. In the past, a cybercriminal had to be a skilled
New DoD CUI Registry
CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the