What Are Tenable and Assured Compliance Assessment Solutions?

Government agencies and contractors in the supply chain face threats every single day. If you haven’t read the news lately, our national infrastructure and data systems face significant challenges in maintaining the security and integrity of their devices, applications and network resources. When agencies and contractors want to connect to any sensitive system, the Department of… Read More

Modern Risk Management and Compliance in 2021

Risk management and assessment is the practice of assessing an organization’s security systems against possible vulnerabilities and gaps to determine how much “risk” is acceptable as part of doing business. Factors like compliance, emerging threats and changes in technology and business operations all play an immense role in how security experts manage the risk their… Read More

Automation and Risk Management

Compliance and risk management aren’t the same, but they are closely aligned with one another. Companies operating with IT and data-intensive technologies and industries must attend to the reality that risk of breach, damage, or data loss exists in their system and that they will almost always have to manage the balance between optimized business… Read More

FedRAMP vs. FISMA Compliance: What is the Difference?

Working with federal agencies can be a big boon for enterprise and SMB service providers. Not only are they working in a lucrative and challenging space, but they can also provide critical infrastructural support to the operation and defense of our country. The regulations, however, can prove a nightmare. For example, should you adhere to… Read More

What is Ransomware and Why Is it a Major Cybersecurity Threat in 2021?

Major infrastructure in the United States is under attack. As more heavy industrial companies, defense contractors and government agencies increasingly rely on cloud platforms and IT solutions to serve their users and constituents, hackers are finding ways to leverage vulnerabilities and steal information.  The problem with these attacks is that they are taking advantage of… Read More

What is NIST Framework for Improving Critical Infrastructure Cybersecurity?

With the more recent threats and attacks we’ve seen in both the Colonial Pipeline and SolarWinds hacks, the question of infrastructure security is firmly in the collective consciousness. With President Biden’s Executive Order focusing executive resources to beef up cybersecurity, the efforts of the government are turning towards addressing some of the gaps that have… Read More

The Role of Compliance in Operational Resiliency

“Resiliency” is a word that gets thrown around a lot by professionals interested in the continuity of business in times of disruption. The fact is that depending on the industry and business model, resiliency is more akin to a science than anything else. Professionals measure things like logistics, statistics, risk and operational effectiveness to balance… Read More

What Your MSP Should Know About HIPAA Compliance

The complexity of healthcare service demands robust technical infrastructure. Advances in patient treatment, research, diagnostic tools and even predictive analytics and AI have pushed technologies available to healthcare providers, which means that these organizations turn to expert providers to give them new tools and features to revolutionize their patient care models. This increased reliance on… Read More

How to Prepare for the Upcoming PCI DSS 4 Update

The Payment Card Industry Data Security Standard is a voluntary security framework to help protect customers and merchants against the theft of credit card data during POS transactions. Like many other compliance frameworks, PCI DSS has continually evolved over the years to match new technologies and new threats to the privacy of consumers shopping online… Read More

How Does CMMC Compliance Impact Small and Mid-Sized Businesses?

The Department of Defense has made a significant push to improve the security of its cyberinfrastructure and supply chain (known as the Defense Industrial Base), and the result of this push is the Cybersecurity Maturity model Certification (CMMC) initiative. This framework uses existing security guidelines to provide an overview of necessary security requirements for federal… Read More

PCI DSS eCommerce: The Cybersecurity Landscape for Retailers in an Always-on Digital Market

While online retail isn’t a new phenomenon, many retailers are still behind when it comes to proper security measures for this form of business. With fraud claims and chargebacks rising exponentially in 2021 due to quarantine and increased online customers, these security measures related to PCI DSS eCommerce are only becoming more necessary, not less.… Read More

Core StateRAMP Reports for Provider Certification

StateRAMP, like any other compliance framework, includes several reports to document a provider’s progress through certification for the Program Management Office (PMO). As of February 2021, however, the PMO is still spinning up its resources and and StateRAMP reports templates. As such, many required report templates are slated for availability on the StateRAMP website but… Read More

What are Impact Levels in StateRAMP Compliance?

As Cloud Service Providers (CSPs) work with State agencies, many of them are undergoing StateRAMP certification. Fortunately, StateRAMP is much like FedRAMP in that it follows several of the same guidelines, requirements, and process structures. Here, we’ll break down one of the basic aspects of StateRAMP Impact Levels. The StateRAMP Impact level directly relates to… Read More

SolarWinds and SUNBURST: The Technical Risks of State-Sponsored Terrorism

The news cycle for anyone connected with cybersecurity has been dominated by information regarding the SolarWinds hack. This breach, starting with a single cloud and security provider, has now become a national emergency as more and more private institutions have become infected with potentially dangerous results. As this situation unfolds, we wanted to touch base… Read More

The Impact of Quantum Computing on Cybersecurity

In December 2020, Chinese researchers claimed to have developed the fastest quantum computer in the world. This computer, built using quantum particles and using light as a medium, can perform calculations exponentially faster than classical computers. What is currently the bleeding edge of computing and scientific research tends to become the norm at some point,… Read More

How to Choose a Security Partner: A Guide for Managed Service Providers

The reality of a world of always-connected customers and cloud platforms is that hackers are overwhelmingly targeting managed service providers. The main question posed in that article was how managed service providers could protect their clients with proper security measures. Here, we want to take this a step further to suggest that these managed service… Read More

7 Ways a Managed Service Provider Can Protect Their Clients 

Managed service providers carry a few additional burdens that many traditional IT companies don’t. Because the products and services of a managed service provider are used by different businesses, often in different industries, there is a balancing act between managing their own security needs and the needs of their clients. Different responsibilities, requirements, and approaches… Read More

Managed Service Providers: What Security Solutions to Use and Offer

Cyber threats aren’t new, but hackers have increasingly turned their attacks on vulnerable managed service providers and their clients. With the data that managed service providers store for those clients, they are a treasure trove for attackers who would use that data to attack those clients, or the MSP itself, with malware and ransomware. 

HIPAA Compliance and Telehealth

One of the many changes brought by the COVID-19 pandemic may be the permanent expansion of telehealth. According to a recent study, the US telehealth market is expected to witness an 80% year-over-year growth in 2020. Numerous video communications services exist, not all provide sufficient privacy and security to facilitate the provision of health care (and… Read More

PCI Compliance is Vital to the Economic Engine of the World

The Evolving Need for PCI DSS Compliance. The current COVID-19 pandemic has dramatically accelerated a trend that was already on the rise — a move toward many new forms of electronic payment that involve capturing and transmitting credit card data. Businesses have moved online-only transactions during this crisis, and many consumers don’t want to handle… Read More

The Coronavirus (COVID-19) meets Cyber Security

Real-word viruses and their online counterparts COVID-19 or the Coronavirus is changing life as we know it. From simple handshakes to finding toilet paper, life has changed tremendously over the past several weeks. Not only is this virus a physical threat, but it is also a threat to cyber-security. Different scams, phishing emails, fake news,… Read More

Deploying Mobile Devices Securely For The SMB

Secure Mobile Device Deployments As we all know, mobile devices have become not an integral part of the workplace, but even in society. Therefore, the safe deployment of these devices is of paramount importance not just for individuals, but businesses and corporations, government agencies, as well as other entities. For example: Mobile devices have indeed… Read More

Preliminary Draft of NIST Privacy Framework Released

The NIST Privacy Framework will complement the popular NIST CSF Data privacy and cyber security have a symbiotic and sometimes conflicting relationship. Without robust cyber security, it is impossible to ensure data privacy, as evidenced by the Equifax hack. However, it’s fully possible for an organization to seriously violate users’ data privacy despite practicing robust… Read More