The importance of cybersecurity user training in NIST 800-171
We’ve made the assertion in our Totem Top 10 that, after you have gathered a complete inventory of all your IT system assets and identified
We’ve made the assertion in our Totem Top 10 that, after you have gathered a complete inventory of all your IT system assets and identified
UPDATE 20 December 2024: This post is about the proposed CMMC rule, which has now been finalized. Therefore, this post has been superseded by our
How to proceed as a DoD Contractor if we must satisfy NIST 800-171 cybersecurity requirements? If you’ve determined that your organization is subject to the
Is your small business a hacker’s dream? While you may think you’re too small to catch the attention of hackers, the statistics tell a different
Why is Separation of Duties difficult to implement for small businesses? During a webinar I gave, in partnership with the Veterans In Business Network, on
Many of us in the DoD contracting world have been working over the past year from the DRAFT versions of the NIST 800-171 A, Assessing
(385) 492-3405
Copyright © 2024 Totem Technologies, LLC
All rights reserved. Privacy Policy.