March 14, 2025
QR Codes: A New Vector for Phishing and Malware
How many times a day do you see a QR code for you to scan with your smartphone to direct…
March 14, 2025
How many times a day do you see a QR code for you to scan with your smartphone to direct…
March 7, 2025
When one company seeks to acquire another, or when two businesses contemplate a merger, pre-deal due diligence is intended not…
March 2, 2025
The number of regulations at the national, state, and local level designed to protect personally identifiable information (PII) has been…
February 17, 2025
If you’ve read a headline about hackers dumping sensitive information that has been illegally obtained on the dark web, you…
January 30, 2025
Department of Defense (DoD) contractors fully understand the need to keep the information they’re entrusted with confidential. Malicious actors are…
January 9, 2025
Department of Defense contractors and subcontractors are faced with increasing, ongoing requirements to maintain strict security over the information they’re…
November 28, 2024
Contractors and subcontractors working on Department of Defense (DoD) contracts are often responsible for handling controlled unclassified information (CUI) as…
November 15, 2024
For many businesses, both large and small, their information technology (IT) needs are demanding and/or specialized enough that they need…
November 11, 2024
For defense contractors in the thick of trying to achieve their required CybersecurityMaturity Model Certification (CMMC) status, their efforts can…
September 1, 2024
Released earlier this year, the Department of Defense’s Defense Industrial Base Cybersecurity Strategy 2024 emphasizes the importance of protecting the…
July 30, 2024
Contractors and subcontractors who handle Controlled Unclassified Information (CUI) as part of their work for the government are routinely targeted…
July 23, 2024
Ransomware is far from being a new threat in the cybersecurity landscape. However, organizations who base their understanding of the…