New DoD CUI Registry
CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the proper cybersecurity
CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the proper cybersecurity
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS
Introduction to Phishing Attacks Phishing attacks are some of the most common cyberattacks in existence. Almost a third of data breaches involved phishing in 2019,
Multi-Factor Authentication for Small Business: Is It Worth the Price? Hacking is a business, after all, and most hackers make their living picking off easy
Introduction to VoIP Traditional phone systems use dedicated lines and systems to carry voice traffic. While this is not a problem in many cases, it
Introduction to the FAR and DFARS Rules The Federal Acquisition Regulation (FAR) provides a set of guidelines for how the US Federal Government can procure
Higher Education is a Large Target for the Adversary From a practical standpoint, colleges and universities collect and store copious amounts of personal data to
How to Address the Totem Top 5 Cybersecurity Safeguards in NIST 800-171 and the CMMC Introduction and Revisiting the Top 5 Cybersecurity Safeguards The CMMC
Email accounts are a prime target for cybercriminals. Whether personal or professional, an email account contains a great deal of sensitive and valuable information and
(385) 492-3405
Copyright © 2024 Totem Technologies, LLC
All rights reserved. Privacy Policy.