Similar Posts
Dark Patterns and the Law
Dark patterns are techniques that web site operators, typically, use to make it more difficult to choose one option than another. For example, try to close your Amazon account or your Facebook account. It used to be that you had to call Amazon and they would try and talk you out of it. Now you…
What is Required for CMMC Level 1 Compliance?
Over the last couple of years we have talked a lot about what is required for CMMC Level 2 certification, but a lot more companies will need to be CMMC Level 1 certified. What is required for this?
The Challenges of Printing CUI
As the Defense Department moves to more tightly control how Controlled Unclassified Information (CUI) is handled, contractors are going to need to deal with how documents that contain CUI such as drawings or deliverables are printed. Listen to this short explanation of what is going to be required. If you have questions, please contact us….
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.
Security News Update for April 20, 2025
Security News Update for April 20, 2025 This week’s news includes:
In Honor of Valentine’s Day – Romance Scams
The FBI says that 19,000 people reported losing over $700 million to romance scams last year. Learn more about these scams by watching or listening. Links mentioned in the video are: FBI National Cybersecurity Alliance Pig Butchering Scams