Earlier this month, the Department of Defense (DOD) released the new Cybersecurity Maturity Model Certification (CMMC) 2.0 framework, along with the self-assessment guides for the new Levels 1 and 2, scoping guidance for all...more
With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more
9/14/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Incident Response Plans ,
Passwords ,
Ransomware ,
Small Business
With almost daily news of top firms impacted by data breaches or ransomware attacks, there is no doubt that effective cybersecurity and data privacy are essential to any business. And small businesses are not immune....more
8/11/2021
/ Cyber Attacks ,
Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Incident Response Plans ,
Passwords ,
Popular ,
Ransomware ,
Small Business ,
Webinars
On May 12, 2021, the Biden administration released a far-reaching executive order intended to improve the U.S. government’s cybersecurity posture, both internally and in any private information technology (IT) systems that...more
5/17/2021
/ Biden Administration ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Executive Orders ,
Hackers ,
National Security ,
Personally Identifiable Information ,
Popular
With top companies permanently moving to a majority remote workforce, the COVID-19 shift to telework is here to stay. Employers need policies and procedures to manage the virtual workplace.
This webinar covers strategies for...more
With top companies permanently moving to a majority remote workforce, the COVID-19 shift to telework is here to stay. Employers need policies and procedures to manage the virtual workplace.
Join Sarah Nash and Anna Wright on...more
6/19/2020
/ Coronavirus/COVID-19 ,
Cybersecurity ,
Data Security ,
Employer Liability Issues ,
Health and Safety ,
Hiring & Firing ,
Labor Disputes ,
Policies and Procedures ,
Remote Working ,
Risk Management ,
Webinars
Now that DOD has released the final version of the Cybersecurity Maturity Model Certification (CMMC) guidelines, all contractors that work directly or indirectly on Department of Defense (DOD) contracts should be preparing to...more
3/3/2020
/ Acquisitions ,
Bid Protests ,
Certification Requirements ,
Cybersecurity ,
Cybersecurity Maturity Model Certification (CMMC) ,
Data Privacy ,
Data Protection ,
Data Security ,
Defense Contracts ,
Department of Defense (DOD) ,
Due Diligence ,
Federal Contractors ,
Information Technology ,
Joint Venture ,
Mentor-Protege Program ,
Mergers ,
Policies and Procedures ,
Subcontractors ,
Webinars
PilieroMazza previously wrote at some length about the Cybersecurity Maturity Model Certification (CMMC), particularly following release of revision (rev.) 0.4 for public comment. The Department of Defense (DoD) has now...more