Officials recently revealed that a data breach occurred involving a Navy Contractor where hackers working for the Chinese government gained access to highly sensitive data regarding submarine warfare. Included in the breach were top secret plans for the design of a supersonic anti-ship missile system that was to be used in U.S. submarines by the […]
The concept of Code Signing SSL Certificates includes protecting users against phony software and assuring that the software is not infected with a virus. Most reputable companies require this certificate before accepting a product and using it. In today’s world, it’s the safest method of guaranteeing that software has not been altered or compromised.
Types of Code […]
Let’s face it: very, very few defense contractors were fully compliant with DFARS 252.204-7012 at the end of last year, when the requirements officially went into effect. The cost, complexity, and availability of key solutions made it nearly impossible for all but the largest contractors to be compliant.
Fortunately, NIST 800-171 clause 3.12.4 allowed for the […]
This is the first in a series of blogs about DFARS 252.204-7012 and how to achieve compliance.
All DOD contractors that work with the covered defense information must be compliant with DFARS 252.204-7012 by December 31, 2017. This requirement, Safeguarding Covered Defense Information and Cyber Incident Reporting is required for contractors that process, store, or transit […]
If your company is like most, you probably aren’t getting maximum usage (or benefit) from your Office 365 investment. Whether it’s because you and your team haven’t had time to work on end-user adoption, or there is a lack of understanding about the extensive capabilities you have access to, it’s very common. Your team’s productivity, […]
A massive cyberattack made news last week affecting computers across the globe. The attack, known as WannaCry is a form or ransomware that primarily attacked older systems, especially those that are not fully patched. It’s suspected that the underlying code used in this attack is related to the exploits stolen from the National Security Agency […]
It’s here! Nothing says Spring like Opening Day of the baseball season. Sun is out, the smell of popcorn and beer in the air, every team is undefeated and in good health. With a little luck and maybe a surprise or two (read: ridiculous career year) from a couple of key players … maybe, just […]
The only way to keep your data safe is to keep your people ahead of the learning curve.
Regardless of their size, companies are constantly being bombarded with phishing scams. If you’re like many small and medium business owners, you may think you aren’t big or important enough to be targeted by hackers. But that’s just […]
Office 365 Groups and Teams are here and they offer a tremendous opportunity for you to improve collaboration across the organization and drive productivity. While we’ve reported on their launch and development, the important news that you need to be aware of is that Groups are now going to be auto-generated in our tenant.
What does […]
Yammer is Here. Microsoft announced in this blog post that Yammer will be activated in Office 365 tenants moving forward. This will apply to all new tenants as well as existing tenants. For clients that do not want to roll out Yammer, you will now have to disable it.
This is a big deal. Enterprise Social […]