by Jason Niemoth | Oct 5, 2021 | Blog
Suppose you were to visit the break room of one of the vendors for the Department of Defense. In that case, chances are that the government’s new Cybersecurity Maturity Model Certification (CMMC) compliance standard is a water-cooler hot topic. Still, there’s a...
by Jason Niemoth | Oct 5, 2021 | Blog
Key Terms Audit – the process of assessing an organization’s cybersecurity maturity in order to achieve CMMC compliance. CMMC evaluates contractors on a range of five compliance levels used to assess the risk they pose when they use, store, and transmit data....
by Jason Niemoth | Oct 5, 2021 | Blog
CMMC Frequently Asked Questions What Is CMMC? The Cybersecurity Maturity Model Certification is a unifying standard for the implementation of cybersecurity across the Defense Industrial Base (DIB). It is designed to protect Federal Contract Information (FCI) and...
by Jason Niemoth | Oct 5, 2021 | Blog
What Is CMMC? The Cybersecurity Maturity Model Certification (CMMC) was developed by the Office of the Under Secretary of Defense for Acquisition and Sustainment. CMMC was designed to help better protect Federal Contract Information (FCI) and Controlled Unclassified...
by Jason Niemoth | Sep 15, 2021 | Blog
Which Form of Encryption is the Most Secure? Remember back when data breaches were something we heard about every once in a while? Nowadays, reports of them are as reliable as sports scores on the daily news. The constant threat has companies scrambling to not only...
by Jason Niemoth | Sep 15, 2021 | Blog
What is an Encryption Certificate? The National Institute of Standards and Technology, or NIST, defines an encryption certificate as “a certificate containing a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or...