NIST 800-171 compliance

CMMC Town Hall

CMMC Town Hall Cyber AB Townhall The Cyber AB Townhall on March 26 and mostly dealt with the timeline for the proposed rules and public comments. Following that discussion was discussion of how training is to change once the rules are finalized and CMMC is officially part of new solicitations.  Finally, there was a discussion […]

CMMC Town Hall Read More »

ASCERTIS RELEASE 2.4

ASCERTIS Release 2.4 ASCERTIS Release 2.4 ASCERTIS Solutions is pleased to announce the latest release of the ASCERTRIS Assessment engine.  The following features have been incorporated.  MULTIFACTOR AUTHENTICATION Previously the application relied on complex passwords which needed to be changed every 6 months.  The latest version includes Multi-Factor Authentication (MFA) in addition to password.  This

ASCERTIS RELEASE 2.4 Read More »

TEMPLATE

Double Click to Edit Title Double click to edit headings. Double click to edit the body text. Double click to edit text Double click to edit text Why Choose ASCERTIS Solutions ASCERTIS Solutions can conduct a security assessment of a small business in a week and provide a roadmap for your company to implement a

TEMPLATE Read More »

Difference between FedRAMP Moderate Certified and FedRAMP Moderate Equivalency

Difference between FedRAMP Moderate Certified and FedRAMP Moderate Equivalency Difference between FedRAMP Moderate Certified and FedRAMP Moderate Equivalency In the context of the Federal Risk and Authorization Management Program (FedRAMP), both “FedRAMP Moderate Certified” and “FedRAMP Moderate Equivalency” refer to security compliance levels for cloud service providers (CSPs) who offer services to U.S. federal agencies.

Difference between FedRAMP Moderate Certified and FedRAMP Moderate Equivalency Read More »

Caller ID Spoofing

Caller ID Spoofing The Caller ID Con I received a phone call from my credit union the other day informing me that they noticed some suspicious activity on my account and wanted to confirm possible fraudulent activities.  I have a spam alert filter on my phone. Although the number from the caller did not trigger

Caller ID Spoofing Read More »

Phishing Attacks Part 2

Phishing Attacks: Part 2 What is Phishing? Phishing attacks use e-mail to trick users into downloading malware onto their systems for the purpose of stealing information or placing the user in a compromising position that the attacker can exploit. Malware can be ransomware, which encrypts all files until the victim pays a ransom – usually

Phishing Attacks Part 2 Read More »

Phishing Attacks Part 1

Phishing Attacks: Part 1 What is Phishing? Phishing attacks use e-mail to trick users into downloading malware onto their systems for the purpose of stealing information or placing the user in a compromising position that the attacker can exploit. Malware can be ransomware, which encrypts all files until the victim pays a ransom – usually

Phishing Attacks Part 1 Read More »