The Cyber Risk of USBs
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word documents, videos,
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word documents, videos,
Totem Technologies’ Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and methodology to achieve CMMC Certification. We follow this Methodology
What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion, guidance, examples, and “clarification”
History of Cyber Crime Cybercriminals are increasingly embracing a service-based economy. In the past, a cybercriminal had to be a skilled hacker, able to carry
CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the proper cybersecurity
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS
Introduction to Phishing Attacks Phishing attacks are some of the most common cyberattacks in existence. Almost a third of data breaches involved phishing in 2019,
Multi-Factor Authentication for Small Business: Is It Worth the Price? Hacking is a business, after all, and most hackers make their living picking off easy
Introduction to VoIP Traditional phone systems use dedicated lines and systems to carry voice traffic. While this is not a problem in many cases, it
(385) 492-3405
Copyright © 2024 Totem Technologies, LLC
All rights reserved. Privacy Policy.