The Interim Rule has been put in place to help with the transition to CMMC. The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January 2020. This decision affected over 300,000 members of the defense industrial base (DIB). This sent the majority, mostly small and […]
This author has yet to write their bio.Meanwhile lets just say that we are proud dtmarketing contributed a whooping 19 entries.
Entries by dtmarketing
What does CMMC stand for? CMMC stands for Cybersecurity Maturity Model Certification. The CMMC is a wholistic move by the U.S. Department of Defense (DoD) requiring the involvement of many moving parts. With cyber-attacks becoming more sophisticated and frequent, the DoD is taking steps to ensure that the highly sensitive information and data they work […]
Companies are collecting and storing more information than ever before, cementing the importance of both data privacy and data security. Now more than ever it’s critical to protect confidential information and ensure business continuity through a robust data protection strategy. We should cover the key concepts of data privacy and data security to help differentiate […]
The Dark Web is an area of the internet that is not visible to search engines, like Google and Bing. Just like the internet we see and use every day, also called the surface web, there are a large number of web pages offering information, products & services, and even peer-to-peer platforms on the Dark […]
It is well known that technology is evolving faster than ever before, and so are tech-related threats. This means that supply chain or vendor compliance and risks have taken on a new meaning in today’s digital world. Cybersecurity and data breach mitigation isn’t what comes to mind when you think about traditional supply chain risk […]
According to a study by CybSafe, human error, whether intentional or unintentional, was the main reason behind 90 percent of data breaches in 2019. To make matters worse, insider-related cybersecurity incidents have increased 47 percent in the last two years. The new era of technology-driven operations has made information sharing and data access very efficient, […]
It was predicted in 2018 by BlueFace, that by 2025 remote work would start competing with office work. Unbeknownst to BlueFace and the rest of the world, the pandemic would accelerate this process tenfold. Businesses were forced to suddenly switch to an almost fully remote workforce. It was like being thrown into the deep end. […]
An excellent option for a small business that values technology that is streamlined and properly integrated but isn’t able to afford, or doesn’t need, a full-time CIO.
Small companies are the #1 victim of cyber attacks and phishing attempts in the world
- How to Build a Security-First Culture for Your Hybrid WorkforceTools are only as good as their users. This should be your guiding philosophy as the world shifts […]
- The Role of Compliance in CybersecurityThe overall technology landscape is evolving at a breakneck pace. While these changes are meant to […]