CMMC: Driving your Information Security Culture Change
Is your firm struggling with understand the role of Polices, Plans, Procedures, & Standards preparation for the United States Department of Defense Cybersecurity Maturity Model Certification (CMMC) or National Institute of Standards and Technology (NIST) SP 800-171 [...]
CMMC: Understanding the Government’s Intellectual Property Acronym Soup
Are you struggling to understand the acronym soup the Federal Government uses to define its Intellectual Property? In this video, we will walk you through the acronym soup (FCI + CDI + CUI + UCTI + CTI) [...]
CMMC: What are the new Level 2 & 3 Practices? (Part 2)
The DoD Cybersecurity Maturity Model Certification (CMMC) adds 20 new practice requirements to the existing 110 National Institute of Standards & Technology (NIST) SP 800-171 controls. This is part 2 of 2 videos that will look at [...]
CMMC: What are the new Level 2 & 3 Practices? (Part 1)
The DoD Cybersecurity Maturity Model Certification (CMMC) adds 20 new practice requirements to the existing 110 National Institute of Standards & Technology (NIST) SP 800-171 controls. This is part 1 of 2 videos that will look at [...]
CMMC: What is with the new CMMC Processes?
The new DoD CyberSecurity Maturity Model Certification (CMMC) introduced Maturity Level Processes. This video walks through the new process requirements that have to be applied to all of the 17 CMMC Domains. You can also watch this [...]
CMMC: Breaking down the Framework
In this video, we walk viewers through the new DoD CyberSecurity Maturity Model Certification (CMMC). Specifically, the video will break down the structure or taxonomy behind the new standard and how the new practice and process requirements [...]
Capital One’s huge hack highlights cloud security risks
Just days after meeting with Ms. Helen Robinson of the Colorado Springs Business Journal to discuss the risks of using Cloud Service Providers, the Capitol One breach occurred. Helen highlights a key point in our conversation, “'You can’t [...]
Are your people raining data from the cloud?
We assume "going to the cloud" will make us more secure. Major failures by the likes of TD Bank, Ford and Netflix highlight the perils of that assumption. Ms. Helen Robinson of the Colorado Springs Business Journal interviewed [...]
Two years after WannaCry, ransomware still kills businesses
Ms. Helen Robinson of the Colorado Springs Business Journal interviewed our Founder and CEO, Matthew Titcombe hatted about the ipactsof Ransomware to Small/Medium sized businesses. The Denver Printing compant, Colorado Timberline, stands as a stark reminder of ransomware's [...]
Small/midmarket businesses fall victim to cyber tricks they can’t afford
Ms. Helen Robinson of the Colorado Springs Business Journal discussed how Small to Medium sized businesses are being targetted for finanical fraud attacks. The article highlights a customer whose financial accounts were breached and they were able to [...]
NIST SP 800-171 & Cloud Service Providers
How do you know if your Cloud Service Provider (CSP) can handle Controlled Unclassified Information (CUI)? What if they don’t have FedRAMP compliance? Getting your organization's Supply Chain compliance accomplished is a critical part of your business maintaining its [...]
Business trust is an open door for hackers, experts warn
Ms. Helen Robinson of the Colorado Springs Business Journal interviewed our Founder and CEO, Matthew Titcombe about Information Security risks companys have with their Supply Chain. The Ponemon Institute reported Supply chain attacks are on the rise with [...]
Flushing Out An APT
Using five of the fundamentals covered in our previous VLOG, we were able to identify, corner, and smother an Advanced Persistent Threat (APT) for a client. The VLOG covers the steps we took.
Printers can hand hackers the keys to castle
With the increasing threats caused by the Internet of Things (IoT) devices, Ms. Helen Robinson from the Colorado Springs Business Journal sought out expertise from our founder and CEO, Matthew Titcombe. In the article, Mr. Titcombe shares his [...]
Information Security Fundamentals
Applying eight (8) fundamental Information Security principles will significantly reduce your risks if being hacked.
All the Controls and Frameworks hang on these two Principles
All Information Security controls and frameworks depend on two key principles: Separation of Duties & Least Privilege
Small businesses sound off about government regulations
Matthew Titcombe, our Founder and CEO, attened a roundtable discussion hosted by the U.S. Small Business Administration’s Office of Advocacy on Aug. 9 at the Colorado Springs Marriott hotel. In the meeting, Mr. Titcombe recommended the Federal Government [...]
Why would a hacker target me??
What started with malware on my Mom's PC became an inquiry into why there are so many hackers targeting all of us. This blog looks Cyber-criminal grunt and their motivations...
I Hate Cybersecurity
Is the current catch phrase "cybersecurity" actually making Information Security worse? In this VLOG we will look into that.
Social Contact