The content for this week’s post was taken with permission from Joseph Brunsman, a broker at Chesapeake Professional Liability Brokers in Anapolis, MD. Joe combines his experience as a former IT, with a Master’s in Cybersecurity Law for an in-depth and very...
Small businesses are often under the misconception that they are too small for a hacker to attack. While it is true that they may be too small to be specifically targeted by a hacker in Russia or China, the automation of malware attacks puts them a just as much risk...
We’ve seen an evolution of ransomware, beginning with malware inserted into malicious advertising on websites by hackers who knew how to code. In the next stage, the Dark Web marketplace allowed people with no coding skills to purchase pre-packaged ransomware...
Organizations frequently share information through various information exchange channels based on mission and business needs. In order to protect the confidentiality, integrity, and availability of exchanged information commensurate with risk, the information being...
Your customers depend on you to guide them through the world of technology. You support their day-to-day needs and recommend new technologies to increase productivity or save money. It makes perfect sense that they would also rely on your to advise them on how to...
There is a lot of uncertainty and misinformation around new Cybersecurity Maturity Model Certification (CMMC), especially for the downstream suppliers who do not directly contact a contracting officer. Small and medium-sized defense contractors should be far more...