CMMC: Understanding the Government’s Intellectual Property Acronym Soup

March 27th, 2020|Categories: CMMC, Compliance, DFARS & NIST SP 800-171, Information Security|Tags: , , , , , , , , |

Are you struggling to understand the acronym soup the Federal Government uses to define its Intellectual Property? In this video, we will walk you through the acronym soup (FCI + CDI + CUI + UCTI + CTI) [...]

CMMC: What are the new Level 2 & 3 Practices? (Part 2)

March 18th, 2020|Categories: CMMC, Compliance, DFARS & NIST SP 800-171, Information Security|Tags: , , , , , , , , |

The DoD Cybersecurity Maturity Model Certification (CMMC) adds 20 new practice requirements to the existing 110 National Institute of Standards & Technology (NIST) SP 800-171 controls.  This is part 2 of 2 videos that will look at [...]

CMMC: What are the new Level 2 & 3 Practices? (Part 1)

March 10th, 2020|Categories: CMMC, Compliance, DFARS & NIST SP 800-171, Information Security|Tags: , , , , , , , , |

The DoD Cybersecurity Maturity Model Certification (CMMC) adds 20 new practice requirements to the existing 110 National Institute of Standards & Technology (NIST) SP 800-171 controls.  This is part 1 of 2 videos that will look at [...]

CMMC: What is with the new CMMC Processes?

March 4th, 2020|Categories: CMMC, Compliance, DFARS & NIST SP 800-171, Information Security|Tags: , , , , , , , , |

The new DoD CyberSecurity Maturity Model Certification (CMMC) introduced Maturity Level Processes. This video walks through the new process requirements that have to be applied to all of the 17 CMMC Domains. You can also watch this [...]

CMMC: Breaking down the Framework

February 26th, 2020|Categories: CMMC, Compliance, DFARS & NIST SP 800-171, Information Security|Tags: , , , , , , , , |

In this video, we walk viewers through the new DoD CyberSecurity Maturity Model Certification (CMMC). Specifically, the video will break down the structure or taxonomy behind the new standard and how the new practice and process requirements [...]

Capital One’s huge hack highlights cloud security risks

July 30th, 2019|Categories: News|Tags: , , , , , , |

Just days after meeting with Ms. Helen Robinson of the Colorado Springs Business Journal to discuss the risks of using Cloud Service Providers, the Capitol One breach occurred. Helen highlights a key point in our conversation, “'You can’t [...]

Are your people raining data from the cloud?

July 26th, 2019|Categories: News|Tags: , , , , , , |

We assume "going to the cloud" will make us more secure.  Major failures by the likes of TD Bank, Ford and Netflix highlight the perils of that assumption. Ms. Helen Robinson of the Colorado Springs Business Journal interviewed [...]

Two years after WannaCry, ransomware still kills businesses

May 31st, 2019|Categories: News|Tags: , , , , , , |

Ms. Helen Robinson of the Colorado Springs Business Journal interviewed our Founder and CEO, Matthew Titcombe hatted about the ipactsof Ransomware to Small/Medium sized businesses.  The Denver Printing compant, Colorado Timberline, stands as a stark reminder of ransomware's [...]

Small/midmarket businesses fall victim to cyber tricks they can’t afford

March 8th, 2019|Categories: News|Tags: , , , , , , |

Ms. Helen Robinson of the Colorado Springs Business Journal discussed how Small to Medium sized businesses are being targetted for finanical fraud attacks. The article highlights a customer whose financial accounts were breached and they were able to [...]

NIST SP 800-171 & Cloud Service Providers

January 14th, 2019|Categories: Compliance, DFARS & NIST SP 800-171, Information Security, Information Security GORP|Tags: , , , , , , , , , , , , |

How do you know if your Cloud Service Provider (CSP) can handle Controlled Unclassified Information (CUI)? What if they don’t have FedRAMP compliance? Getting your organization's Supply Chain compliance accomplished is a critical part of your business maintaining its [...]

Business trust is an open door for hackers, experts warn

October 26th, 2018|Categories: News|Tags: , , , , , , |

Ms. Helen Robinson of the Colorado Springs Business Journal interviewed our Founder and CEO, Matthew Titcombe about Information Security risks companys have with their Supply Chain. The Ponemon Institute reported Supply chain attacks are on the rise with [...]

Printers can hand hackers the keys to castle

September 22nd, 2018|Categories: News|Tags: , , , , , , |

With the increasing threats caused by the Internet of Things (IoT) devices, Ms. Helen Robinson from the Colorado Springs Business Journal sought out expertise from our founder and CEO, Matthew Titcombe. In the article, Mr. Titcombe shares his [...]

Small businesses sound off about government regulations

August 18th, 2018|Categories: News|Tags: , , , , , , |

Matthew Titcombe, our Founder and CEO, attened a roundtable discussion hosted by the U.S. Small Business Administration’s Office of Advocacy on Aug. 9 at the Colorado Springs Marriott hotel. In the meeting, Mr. Titcombe recommended the Federal Government [...]

Information Security Turnaround Specialists