On Friday, May 7th, a ransomware attack disrupted operations and halted the flow of gasoline, diesel, and jet fuel through Colonial Pipeline. This was the largest cyberattack on an oil infrastructure target in US history. It led to a shutdown of the pipeline carrying 45% […]
If your business is a subcontractor in the defense industrial base, you have, no doubt, been hearing a lot over the past year about Cybersecurity Maturity Model Certification. Still the definition of each level and the path to your desired CMMC level may be […]
Webinar: Right-Sized Solutions for NIST/CMMC Compliance
When: Thursday, April 8th, 2021 at noon
Registration: Registration for this event is closed, but you can now view the presentation any time, on demand at this link.
New rules regarding CMMC compliance have small and medium-sized federal contractors wondering, “How […]
If you are a supplier to the defense industrial base (DIB), Cybersecurity Maturity Model Certification (CMMC) may be intimidating, even overwhelming. This series of blog posts will explore CMMC for small and medium-sized businesses, leading to right-sized solutions.
EXP Technical will host a FREE webinar on Thursday, September 10th 2020.
FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES!
FREE DRAWING FOR A MICROSOFT SURFACE FOR ONE LUCKY WINNER!
Pat Cooke, CISSP and Principal at EXP will host a free webinar on Thursday, September 10th 2020 […]
Office 365 and now Microsoft 365 subscriptions provide a plethora of applications and features, but you probably only use a couple of them. This presentation will give you an overview of:
What subscriptions are available and how much they cost
What you get with each subscription
Potential ways […]
Along with being one of the largest employers in the greater Seattle area, Microsoft has also helped create a wide network of local vendors and suppliers — all of which are required to meet compliance standards.
Whether its work or personal, passwords are an integral part of our routines at every level of access, and with the increasing complexity of illicit attempts to gain entry into our lives of password laden data it forces us to adapt and further enforce our own internal password policies & procedures.
In doing so it also creates additional points of user vulnerability if we continue to rely on the password storage recall techniques of days past.
There is a lot more to maintaining a good cybersecurity program than the five important items mentioned here, especially if you are in a high-compliance line of work such as healthcare or government contracting. But it’s an excellent place for small and medium organizations to start.
Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.