Identification and Authentication

  Identification and authentication are the first line of defense to prevent unauthorized  people or processes from entering our networks. CMMC addresses this crucial issue with the IA domain of controls. This includes 9 practices and 26 objectives which must be...

Don’t leave your front door unlocked!

You wouldn’t let just anyone into your home. Those who you do let in shouldn’t be able to do anything they pleased. The same holds true for our organizations, and CMMC 2.0 takes this very seriously with the Physical Protection (PE) domain. Here we find 6 controls with...

Be Aware

Statistics from many sources suggest the majority of cyber breaches are caused by human error. The latest high-profile attack was launched against MGM where an attacker used publicly available information on social media along with a persuasive phone presentation to...

BUCKLE UP DIB!

BUCKLE UP DIB! CMMC is in the rearview mirror closing the distance behind you until its on your rear bumper. It could be a year from now or a little longer but do not wait. When CMMC becomes law there will be a rush to action and confusion on how to proceed. Get...

Getting started with CMMC

. CMMC 2.0 is the latest version and contains 14 domains. Within those domains are 110 security controls which lead to 320 objectives. These are detailed in the National Institute of Science and Technology (NIST) publication 800 – 171. Many of these controls are...

Introduction to CMMC

.   Our nation’s defense contractors and supply chain face fierce attacks from unseen adversaries who prey on cybersecurity weaknesses. Their goal is to steal cutting edge technology and research that makes the US the world’s most formidable superpower. Vigilant...