FEATURE STORY
Beyond USB Storage Devices: The Increasing Risk of USB-Connected Headsets, Webcams
Read MoreWelcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.
2021 has seen significant improvements in the digital realm. There has been a revolution in the way businesses operate, led by advances in the Internet of Behaviors (IoB), 5G technologies, and new developments in Big Data Analytics. However, not all changes in 2021 were positive. In fact, as technology became even more sophisticated, challenges in […]
Data Loss Prevention (DLP) involves using tools and processes to ensure that vulnerable data is not lost, used with malicious intents, or utilized by unauthorized individuals. In an organization, sensitive data can be compromised by both internal and external sources. For example, research shows that 33% of all folders used by companies are open to […]
The digital revolution has made lives easier but has also brought along some unique challenges for growing businesses, one of the most common of which is the increased rate of cyberattacks. In fact, research shows that from 2019 to 2020, 68% of organizations experienced one or more endpoint attacks that successfully compromised data or IT […]
Organizations seeking CMMC certification who’ve proven to effectively implement NIST SP 800-171 protocols shouldn’t have a difficult time becoming CMMC compliant. However, the businesses that might not have been playing by the rules should be prepared for a large amount of work over the next few years. You Don’t Need To Invent The Wheel The […]
Preparing for Your CMMC Audit Organizations seeking Cybersecurity Maturity Model Certification must make sure their company is 100% ready for certification before they begin the certification process, or they will fail their audits. Assessment guides are available to help walk organizations through the process. Still, they’ll want to make sure they fully understand not only […]
Why Are Cybersecurity Self-Assessments No Longer Sufficient? In 2020, the Internet Crime Complaint Center received a staggering 791,790 complaints totaling $4.1 billion in damages, up 69% since 2019. As these attacks continue to accelerate, the Department of Defense (DoD) supply chain industry has been a prime target, many of the most brutal hits occurring in […]
What Is CUI? As companies are learning more about the government’s new Cybersecurity Maturity Model Certification (CMMC) program, there’s a lot of uncertainty surrounding CUI or Controlled Unclassified Information. CMMC was designed to protect CUI, but what information is considered CUI? CUI Is Defined As: The problem with this explanation is that it’s complicated […]
As cybercriminal activity rapidly progresses, threats to economic and national security are exponentially expanding. While the Defense Industrial Base (DIB) sector and the Department of Defense (DoD) supply chain continue to be prime targets, these malicious attacks jeopardize technological advantages and national security. The DoD is working with industries to protect unclassified information within the […]
Should Your Business Worry About CMMC? The short answer is yes. If you’re a contractor working with the DoD or even as a subcontractor on DoD projects, expect these new requirements to apply to your business soon. The DoD estimates that by the end of 2021,15 contracts will include CMMC requirements, and by 2025, 479 […]
Suppose you were to visit the break room of one of the vendors for the Department of Defense. In that case, chances are that the government’s new Cybersecurity Maturity Model Certification (CMMC) compliance standard is a water-cooler hot topic. Still, there’s a lot of confusion surrounding it, primarily because the folds and kinks are in […]