Working With the Department of Defense in 2020? Start Planning for the New Certification.

November 5, 2019
In what is certain to be a wakeup call for many organizations involved in Department of Defense contracts, The Cybersecurity Maturity Model Certification (CMMC) is set to become a part of life in 2020. Much like previous requirements, the CMMC requirements will also apply to subcontractors, and all Requests for Proposal (RFPs) will require CMMC...
state of ohio seal blog graphic

Is Ohio Senate Bill 220 an Example for the Other 49 States?

May 16, 2019
Passing with 24 yeas and 8 nays, effective as of November 2, 2018, Ohio Senate Bill 220 was touted as a way to use the ‘carrot approach’ for organizations to increase cybersecurity. This incentive was to encourage the shielding of data breach liability for organizations in certain situations. Excerpts from the bill are provided below....
US Capitol Building icon

NIST Guidance for Small Business Forthcoming

September 27, 2018
The National Institute for Standards and Technology, usually referred to as NIST, has many valuable resources, including resources for computer security. The NIST Cybersecurity Framework (NIST CSF) and the NIST 800 series are familiar to most people in the information security industry. The NIST standards are commonly used not only by organizations that are bound...
California flag graphic

First Came the GDPR, Now Comes “The California Consumer Privacy Act of 2018”

June 29, 2018
If you count California residents amongst your customers, or those whose data you have (and given that California is one of the 10 largest economies in the world, there is a good chance that you do), it is likely that The California Consumer Privacy Act of 2018 could significantly change the way that you must...
Hamerstone Standard graphic

Another Standard to Keep in Mind

June 28, 2018
In TrustedSec’s Advisory division, one question we often hear is, “how can we prioritize our information security efforts?” It is not surprising, as there are many things organizations can and often should be doing from an information security perspective, but there are only so many hours in the day, and so many dollars in the...

Understanding the Why

June 12, 2015
Time and time again, whether reading the news about the latest breach, or performing an assessment, it seems that it’s the simple things that so often get missed or neglected. Patches, network segmentation, default configurations and misconfigurations. Ensuring the security basics get covered isn’t a panacea for our security ills, but it can go a...
  • Browse by Category

  • Clear Form