Totem Technologies' Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and
“What the heck?” Series Part 1: Processes Acting on Behalf of Authorized Users
What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion,
Understanding Malware as a Service
History of Cyber Crime Cybercriminals are increasingly embracing a service-based economy. In the past, a cybercriminal had to be a skilled
Phishing Prevention Best Practices
Introduction to Phishing Attacks Phishing attacks are some of the most common cyberattacks in existence. Almost a third of data breaches involved
Multi-Factor Authentication for Small Business
Multi-Factor Authentication for Small Business: Is It Worth the Price? Hacking is a business, after all, and most hackers make their living
Email Security Best Practices
Email accounts are a prime target for cybercriminals. Whether personal or professional, an email account contains a great deal of sensitive and
Building a Mature Cybersecurity Program
Steps to Build your Cybersecurity Program Cybersecurity Programs have become a “top of mind” priority for most organizations. As the number of
Cybersecurity Best Practices for IT Managers
Cybersecurity Best Practice Guide for IT Managers If you’re an IT manager tasked with designing, implementing, and
Cybersecurity Threat: Social Engineering
What is Social Engineering and how is it a cybersecurity threat? Are people the weakest link when it comes to security?