Cyber Security Expertsfor Small Business Government Contractors
Resources
Resources
We have compiled a collection of valuable resources and white papers that you may find informative and helpful. Please choose one from the left hand menu.
Our product offerings are all tailored to the exact needs and budgets of each individual client ensuring a solution that not only meets the clients' needs but also integrates well within existing processes and structures.
Walt Constantine
CEO
Contact us here for more information.
NIST 800-171 Publication
This is the official NIST 800-171 Publication from the National Institute of Standards and Technology. The document is a codification of the requirements that any non-Federal computer system must follow in order to store, process, or transmit Controlled Unclassified Information (CUI) or provide security protection for such systems.
The publication is available free of charge from:
https://csrc.nist.gov/publications/detail/sp/800-171a/final
Silver Bullet Compliance
There are many entities claiming to have a "silver bullet" single action solution to NIST 800-171 compliance. Sometimes a simple checklist survey is advertised, or company wide systems move to the cloud is sugggested.
While there are elements of becoming NIST 800-171 compliant that can be simplified in many circumstances, there is also great risk to asscoiated with not paying full and close attention to the regulation.
The aftermath of an audit or, worse yet, a data breach woukd likely be catastrophic to a organization who's compliance is declared without the benefit of a proper and fully documented compliance process.
[whitepaper coming soon]
SMB Guide to Cyber Security
Most of us only hear about cases involving big international companies in the headlines, but hackers frequently target small businesses for a number of reasons, and small businesses are actually among the most popular targets for cybercriminals today.
The threats are great and evolving and a severe cyber attack can bring almost any business to its knees.
[read more]
Is Your Website Phishing for Somebody Else?
A phishing or phish kit is a pre-created set of files a hacker with limited technical knowledge can upload to a targeted website. They're clever and sometimes hard to detect, especially if you're not looking, and potentially very damaging to your business.
[read more]
Your Biggest Security Risk Factor
Employees are an organization's biggest risk factor, and social engineering hacks continue to play on people's inability to identify cyber threats. Identifying employee risk factors can be difficult and what you find may be surprising.
[read more]