Supply Chain Risk Management (SCRM) Explained

Supply chain risk management (SCRM) is the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of IT products and service supply chain ... Read More

Non-sensitive PII + Sensitive PII = Sensitive PII

| | FEATURED, pii, Privacy
Non-Sensitive PII together combined with Sensitive PII = Sensitive PII ... Read More

The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government

This would be like a Civilian Cybersecurity Reserve and it would be voluntary and by invitation only.  This would allow our national security agencies to have access to the qualified, capable, and service-oriented American talent necessary to respond when an attack occurs ... Read More

Parent/Child Agreement Contract

Nowadays having an online agreement or a set of rules that guides both a child and parent on online usage and expectations makes a lot of sense.  It also allows an opportunity for both the parent and child to talk about the components that are in the contract as a ... Read More
Internet Safety Tips for Seniors and Scams to Watch Out for

Internet Safety Tips for Seniors and Scams to Watch Out for

| | Internet Safety
According to a Pew Research Center survey, about 66% of Americans are over the age of 65 and many of them are online ... Read More

5 Teen Internet Safety Tips

How could our teens live without their smartphones, laptops, and other devices that allow them to go online, communicate and have fun with their friends in a safe manner?  We have provided five (5) tips they should remember ... Read More

Update Greenbone Vulnerability Management Plugins (NVT, Cert Data & SCAP Data) Automatically

Once you have installed or configured the Greenbone Vulnerability Management system it is a good idea to ensure it is kept up to date and running the latest security scripts to find the latest vulnerabilities as well as sync to the most updated nvt, scap and cert data.  The best ... Read More

SA.3.169 Community-based Threat Sharing (CMMC Level 3)

Receive and respond to cyber threat intelligence from information sharing forums and sources and communicate to stakeholders ... Read More

IR.2.092 Incident Preparation (CMMC Level 2)

Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities ... Read More

SI.1.210 System Integrity/Patching (CMMC Level 1)

Identify, report, and correct information and information system flaws in a timely manner ... Read More