The New C3 Website is Here!

  After months of hard work, we're pleased to announce that we just launched our new website. Now it’s even easier to find the technology services and solutions that will help your organization succeed. Take a few minutes to look around to see what’s new. What Will You Find? Our new website provides the IT solutions and services that you need to Connect, Communicate & Collabo...

Keep Reading

New Guidance Issued to Evaluate NIST 800-171 POAMs

Let's face it: very, very few defense contractors were fully compliant with DFARS 252.204-7012 at the end of last year, when the requirements officially went into effect.  The cost, complexity, and availability of key solutions made it nearly impossible for all but the largest contractors to be compliant. Fortunately, NIST 800-171 clause 3.12.4 allowed for the submission of a System Security Pla...

Keep Reading

Making Sense of the Upcoming DFARS 252.204-7012

This is the first in a series of blogs about DFARS 252.204-7012 and how to achieve compliance. All DOD contractors that work with the covered defense information must be compliant with DFARS 252.204-7012 by December 31, 2017. This requirement, Safeguarding Covered Defense Information and Cyber Incident Reporting is required for contractors that process, store, or transit CDI.   Failure to compl...

Keep Reading

Maximize Your Office 365 Investment

[caption id="attachment_13317" align="alignright" width="300"]               Microsoft Outlook Inbox[/caption] If your company is like most, you probably aren’t getting maximum usage (or benefit) from your Office 365 investment. Whether it’s because you and your team haven’t had time to work on end-user adoption, or there is a lack of understanding about the extensive capabilit...

Keep Reading

WannaCry Will Not Be the Last Attack

A massive cyberattack made news last week affecting computers across the globe.  The attack, known as WannaCry is a form or ransomware that primarily attacked older systems, especially those that are not fully patched.  It’s suspected that the underlying code used in this attack is related to the exploits stolen from the National Security Agency (NSA) and made publicly available by Shadow Brok...

Keep Reading

Are you more sophisticated than the hackers?

The only way to keep your data safe is to keep your people ahead of the learning curve. Regardless of their size, companies are constantly being bombarded with phishing scams. If you’re like many small and medium business owners, you may think you aren’t big or important enough to be targeted by hackers. But that’s just not the case. In fact, small and medium businesses are easier to hack an...

Keep Reading

Office 365 Groups Are Here and You Need to Be Ready

Office 365 Groups and Teams are here and they offer a tremendous opportunity for you to improve collaboration across the organization and drive productivity.  While we've reported on their launch and development, the important news that you need to be aware of is that Groups are now going to be auto-generated in our tenant.   What does this mean? According to the Support Article published t...

Keep Reading
Call Us: (571) 384-7950