New DFARS Interim Rule for DoD Cybersecurity
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS

Introduction to Phishing Attacks Phishing attacks are some of the most common cyberattacks in existence. Almost a third of data breaches involved phishing in 2019,
Multi-Factor Authentication for Small Business: Is It Worth the Price? Hacking is a business, after all, and most hackers make their living picking off easy
Introduction to VoIP Traditional phone systems use dedicated lines and systems to carry voice traffic. While this is not a problem in many cases, it
Introduction to the FAR and DFARS Rules The Federal Acquisition Regulation (FAR) provides a set of guidelines for how the US Federal Government can procure
Higher Education is a Large Target for the Adversary From a practical standpoint, colleges and universities collect and store copious amounts of personal data to

How to Address the Totem Top 5 Cybersecurity Safeguards in NIST 800-171 and the CMMC Introduction and Revisiting the Top 5 Cybersecurity Safeguards The CMMC
Email accounts are a prime target for cybercriminals. Whether personal or professional, an email account contains a great deal of sensitive and valuable information and
CMMC Pricing Details The CMMC Accreditation Body, entrusted by the Department of Defense to manage the CMMC ecosystem, has finally begun sharing the requirements for