See this article as it originally appeared in Industry Today.
If you are a business leader for a manufacturer that is part of the U.S. Defense Industrial Base, you are likely awaiting word about the new CMMC 2.0 standards. You may be checking the internet every week to see if there is any news about when they will be released. You may be wondering what the new standards will require of your organization.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
See this article as it originally appeared in the Hartford Business Journal. Almost every company has a set of policies and procedures in place, whether for employee conduct, safety, attendance or human resources functions, to name a few. But if a company doesn’t have an IT policy in place, it’s missing an important first step in improving productivity and guarding against cybersecurity threats.
I can’t tell you the number of times someone has asked me what they should do after a cyber breach. At that point, their organization is in crisis mode. While certain actions can minimize the effect of a breach after the fact, effective preparation before a breach happens is always the best defense.
If your company is a government contractor or subcontractor, you may be wondering what is going on with the Cybersecurity Maturity Model Certification (CMMC).
Cybersecurity awareness month has come to a close and all throughout October, Kelser was helping to bring attention to this issue. Our cybersecurity tips of the day on Facebook, Twitter, and LinkedIn helped attract the attention of NBC Connecticut and FOX 61.
With data breaches in the news every day, most organizations have shored up their cybersecurity efforts. In spite of that, many have overlooked a key element: physical security.
It seems like every day, we hear stories about cyber attacks, ransomware demands, and data breaches. The Ponemon Institute reported that the average cost of a U.S. data breach in 2020 was $8.64 million.