How to create a POA&M for CMMC compliance
When a Quick Fix Just Isn’t Possible Security standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC) provide common frameworks for managing robust
When a Quick Fix Just Isn’t Possible Security standards like NIST 800-171 and the Cybersecurity Maturity Model Certification (CMMC) provide common frameworks for managing robust
The Cybersecurity Maturity Model Certification (CMMC) was designed to improve the security posture of the Defense Industrial Base. In developing the framework, Pentagon officials drew
USBs (as well as CDs, DVDs, etc.) are designed to provide removable storage for a computer. This storage includes both data files (Word documents, videos,
Totem Technologies’ Small Business CMMC Preparation Methodology This post describes Totem Technologies’ (Totem.Tech) three-phased approach and methodology to achieve CMMC Certification. We follow this Methodology
What the heck are processes acting on behalf of authorized users? Excellent question, especially since NIST SP 800-171 and CMMC discussion, guidance, examples, and “clarification”
History of Cyber Crime Cybercriminals are increasingly embracing a service-based economy. In the past, a cybercriminal had to be a skilled hacker, able to carry
CUI in a Nutshell Not having a thorough understanding of Controlled Unclassified Information (CUI) has made it difficult for Contactors to put the proper cybersecurity
Introduction to and Explanation of the Proposed DFARS Interim Rules In a proposal published in the Federal Register, the DoD has outlined three new DFARS
Introduction to Phishing Attacks Phishing attacks are some of the most common cyberattacks in existence. Almost a third of data breaches involved phishing in 2019,
(385) 492-3405
Copyright © 2024 Totem Technologies, LLC
All rights reserved. Privacy Policy.