• Skip to primary navigation
  • Skip to main content
  • Skip to footer

  • Compliance
    • CMMC/NIST 800-171 Virtual Classroom
    • Consulting
    • Compliance Software
  • Consulting
    • Cyber Risk Assessment
    • Security Controls Assessment
    • Supply Chain Security
    • Cybersecurity Policy Development
      • System Security Plan
      • Plan of Action and Milestones
      • Acceptable Use Policy
      • Incident Response Plan
    • ICS/SCADA Services
    • Penetration Testing
    • Vulnerability Scanning
  • Industries
    • DoD Contractors
    • Health Care (HIPAA)
    • Higher Education
    • Utilities/Critical Infrastructure
    • Local and Federal Government
  • Trainings
    • CMMC / NIST 800-171 Virtual Classroom
    • DFARS Cybersecurity E-Book
    • Cybersecurity Awareness
    • IT Administrators
  • Pricing
  • About
    • Team
    • Partners
    • Careers
  • Blog
  • Contact
Request a Quote

Small Business Cybersecurity

You are here: Home / Archives for Small Business Cybersecurity
CMMC Preparation Methodology

December 23, 2020

CMMC Preparation Methodology executed by Totem Technologies

Totem Technologies' Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and

Category iconCybersecurity,  Cybersecurity Maturity Model Certification (CMMC),  DFARS 7012,  NIST 800 171,  Small Business Cybersecurity Tag iconCMMC,  CMMC Compliance,  DFARS 7012,  POA&M,  System Security Plan

Processes Acting on Behalf of Authorized Users

December 10, 2020

“What the heck?” Series Part 1: Processes Acting on Behalf of Authorized Users

What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion,

Category iconCybersecurity Maturity Model Certification (CMMC),  Cybersecurity Policy and Compliance,  NIST 800 171,  Small Business Cybersecurity Tag icon800-171,  access control,  authorized user,  CMMC,  nist,  process

Malware as a Service

November 5, 2020

Understanding Malware as a Service

History of Cyber Crime Cybercriminals are increasingly embracing a service-based economy.  In the past, a cybercriminal had to be a skilled

Category iconCybersecurity,  Cybersecurity Awareness,  Small Business Cybersecurity Tag iconMaaS,  Malware,  Malware as a Service,  Malware Protection,  Malware Threat

Phishing Prevention Best Practices

September 29, 2020

Phishing Prevention Best Practices

Introduction to Phishing Attacks Phishing attacks are some of the most common cyberattacks in existence. Almost a third of data breaches involved

Category iconCybersecurity,  Cybersecurity Awareness,  Small Business Cybersecurity Tag iconPhishing,  Phishing Prevention

Multi-factor authentication MFA for small business

September 10, 2020

Multi-Factor Authentication for Small Business

Multi-Factor Authentication for Small Business: Is It Worth the Price? Hacking is a business, after all, and most hackers make their living

Category iconCybersecurity,  Small Business Cybersecurity Tag iconMFA,  MFA for Small Business,  Multi-Factor Authentication

email security

July 7, 2020

Email Security Best Practices

Email accounts are a prime target for cybercriminals. Whether personal or professional, an email account contains a great deal of sensitive and

Category iconCybersecurity,  Cybersecurity Awareness,  Small Business Cybersecurity

cybersecurity program

April 29, 2020

Building a Mature Cybersecurity Program

Steps to Build your Cybersecurity Program Cybersecurity Programs have become a “top of mind” priority for most organizations. As the number of

Category iconCybersecurity,  Small Business Cybersecurity

Cybersecurity Best Practices

November 15, 2019

Cybersecurity Best Practices for IT Managers

Cybersecurity Best Practice Guide for IT Managers         If you’re an IT manager tasked with designing, implementing, and

Category iconCybersecurity,  Cybersecurity Policy and Compliance,  Small Business Cybersecurity Tag iconCybersecurity Best Practices,  Cybersecurity for IT Managers,  Cybersecurity for Small Business

September 12, 2019

Cybersecurity Threat: Social Engineering

What is Social Engineering and how is it a cybersecurity threat?         Are people the weakest link when it comes to security?

Category iconCybersecurity,  Cybersecurity Awareness,  Small Business Cybersecurity Tag iconSocial Engineering

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Footer

Totem Cybersecurity

Simplifying your cybersecurity through consulting, compliance training, cybersecurity compliance software, and other cybersecurity services.

(855) 405-4075

[email protected]

Cybersecurity Services

  • Consulting
  • Cybersecurity Training
  • Compliance Software
  • Industries Served
  • Pricing

Cybersecurity Compliance

  • DoD Contractors
  • CMMC
  • NIST 800 171
  • HIPAA Security Rule
  • Colleges and Universities

Newsletter

Copyright © 2021  Haight Bey & Associates LLC DBA Totem Technologies. All rights reserved. Return to top

Cybersecurity Compliance from Totem