Similar Posts
Do You Know What a Quishing Attack is? Hackers Do!
ByadminQuishing is the act of using malicious QR codes to launch a cyber attack and, apparently, it is very popular. So popular the FBI and the FTC are sending out alerts. Why is it popular? Listen and find out.
CMMC Update for October 2024 – Part 2
ByadminThe Final rule for Title 32 is out. Here is a more detailed explanation of some of the requirements. This is a very complex rule at about 475 pages. Most of that is explanation, but still there is a lot to this part of the rule. Please contact us if – excuse me – when…
- CMMC | Compliance | DIB | DoD
Which CMMC Controls Can Be PoAMed?
ByadminFirst, what is a PoAM? A PoAM is, basically, a plan to fix any issues that were found during an assessment. Under CMMC, currently, a company can miss some controls and still get a provisional check mark. But, the rules as to what can be in a PoAM – that is pretty restricted. As is…
- CMMC | Compliance | DIB | DoD | IT Infrastructure
NIST SP 800-171 Rev 3 Update for August 2023
ByadminNIST has released a draft version of the next update to the core standard behind CMMC. If you do work for the US, Canadian or Australian defense departments or are a vendor to one of these organizations or if you are a vendor to a large US corporation, this standard and these changes are important…
Banking Social Engineering Scams are Alive and Well
ByadminThe easiest way for hackers to steal your money is to get you to help them do it. We are seeing attacks where the victim gets a text message supposedly from their bank about a potentially fraudulent transaction and asking the victim if it is legitimate. If the victim answers, the hacker goes into high…
- CMMC | Compliance | DIB | DoD | IT Infrastructure | Legal | Privacy | Security News Update
Security News Update for May 4, 2025
ByadminThis week’s news includes: