IT Managed Services

A blog for understanding best practices in technology

What is CMMC Compliance?

The Cybersecurity Maturity Model Certification (CMMC) was created to enhance the cybersecurity posture of companies participating in US government supply chains. As of December 31, 2017, defense and government suppliers had to comply with NIST 800-171. Starting in 2020, the DoD will gradually transition federal contract information to include CMMC instead of NIST 800-171.
Read More

Microsoft Renames Office 365 Plans

Effective April 21, 2020, Microsoft has renamed some of the Office 365 subscription plans for small and medium businesses. There are no price, feature, or business model changes to commercial subscriptions. The changes are in name only.
Read More

Work from Home Securely During the Coronavirus Outbreak

It seems like the world spun around and turned upside down in the blink of an eye. While some businesses are going to struggle in the coming months, others will pivot and find creative ways to get work done successfully and maintain cybersecurity best practices.
Read More

The Benefits of Microsoft 365 Security Features

Microsoft 365 is an integrated solution that includes Office 365 and Windows 10 Enterprise, plus enterprise-level mobility and security features. Because of the included security features of Microsoft 365, you can save money by upgrading from Office 365 to Microsoft 365.
Read More

Revision 2 of NIST SP 800-171 is Released

As of December 31, 2017, companies that provide parts and services for suppliers serving federal and local governments must comply with the NIST 800-171 mandate. There have been some recent changes in how compliance is managed for this mandate.
Read More

CMMC Version 1.0 is Released

To increase the cybersecurity posture of companies operating in government supply chains, the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC) in 2019, and a draft was made available. On January 30, 2020, the DoD released Version 1.0 to the public.
Read More

Using a SIEM to Detect BEC & Other Cyber Attacks

Business email compromise (BEC), or imposter email, continues to plague businesses. In these scenarios, criminals gain access to an email account. Then, using the compromised account, they attempt to trick someone into sending money or sensitive information.
Read More

Microsoft 365 vs Office 365

Microsoft 365 and Office 365 are available in two sets of plans – one set for companies with up to 300 employees and another set for enterprise companies. Microsoft 365 includes the Office applications and business productivity tools of Office 365, but with lots more added in. What's even better is that the business plan includes a lot of security features you would expect to find only in enterprise plans.
Read More

Cybersecurity Maturity Model Certification & NIST Compliance

As of December 31, 2017, companies that provide parts and services for suppliers serving the government were required to be compliant with the NIST 800-171 mandate. Starting in 2020, a new certification will be required: Cybersecurity Maturity Model Certification.
Read More

How to Improve Your Firewall Security with a Vulnerability Assessment

Your network firewall serves as the first line of defense between your network and the untrusted Internet. The configuration of the firewall is equally as important as the firewall itself. And since networks evolve over time, you need to check the configuration on a regular basis and make changes as warranted.
Read More

Subscribe to Email Updates