CMMC V1.02 – SI.1.213 – Perform Periodic Scans of Information Systems

  • Posted by Mark Lupo
  • On August 8, 2020
In our final entry of the Practices found in CMMC Level 1, within the Domain, System and Information Integrity, we cover SI.1.213 – Perform periodic scans of information systems and real-time scans of files from external sources as files are downloaded, opened or executed.  This Practice is found within the Capability, C041, Identify Malicious Content, […]
Read More
 1

CMMC V1.02 – SI.1.212 – Update Malicious Code Protection Mechanisms

  • Posted by Mark Lupo
  • On August 7, 2020
The third Practice within the System and Information Security, also falling under the Capability, C041, Identify Malicious Content, is SI.1.212 – Update Malicious Code Protection Mechanisms When New Releases are Available.  This Practice focuses on ensuring you protect your IT system with new security releases and monitoring your system regularly.  You can find the Practice […]
Read More
 1

CMMC V1.02 – SI.1.211 – Provide Protection From Malicious Code

  • Posted by Mark Lupo
  • On August 6, 2020
We now explore the 2nd Practice within the Domain, System and Information Integrity (SI), S.I.211 – Provide protection from malicious code at appropriate locations within organizational information systems. This Practice falls under the second Capability within the (SI) Domain, C041, Identify Malicious Content and can be found in the CMMC Appendix B, page B-238 (Page […]
Read More
 1

CMMC V1.02 – PE.1.132 – Escort Visitors and Monitor Visitor Activity

  • Posted by Mark Lupo
  • On July 20, 2020
This entry is the second Practice within the Physical Protection (PE) Domain and the Capability, Limit Physical Access.  This Practice, PE.1.132 – Escort Visitors and Monitor Visitor Activity, aligns with the prior one, PE.1.131, Limiting physical access to organizational information systems and, again, is pretty straight forward.  Essentially, to meet compliance with this Practice, an […]
Read More
 

CMMC V1.0 – AC.1.003 – Verify, Control and Limit Connections to, and Use of, External Information Systems.

  • Posted by Mark Lupo
  • On February 24, 2020
The third Practice required to be implemented under CMMC V1.0 within your information security plans, falls under the capability, Limit data access to authorized users and processes (C004).  This capability has similarities to the previous one discussed, Control internal system access (C002), and differs only that the expectations within AC.1.003 relate to limiting access to […]
Read More
 1

CMMC V1.0 – Level 1 Compliance – AC.1.002 – Limiting System Access to Types of Transactions

  • Posted by Mark Lupo
  • On February 18, 2020
In this and succeeding entries, we will review one or two Practices per article, focusing on the description of the practice and the clarifying statement and examples provided within Appendix B of CMMC V 1.0.  The second practice required to achieve Level 1 compliance under the CMMC standard falls under the second capability, Control internal […]
Read More
 1

Maximum Money – Improve Cash Flow & Boost Profits

  • Posted by Stacy Johnson
  • On August 30, 2019
Evaluating a company’s financial health is an essential skill for all business owners. This Maximum Money Course covers the fundamentals of financial analysis. In once a week for five weeks, participants have the opportunity to develop a comprehensive 12 month financial forecast.
Read More
 1

Change – Win With It!

  • Posted by Ashley Panter
  • On March 5, 2019
Throughout my life there has been one constant factor in my business and sports career and that factor has been change. When I first entered professional football it was quite an adjustment. I had to change my routines and communicate to my new team, especially the snapper and holder, the critical value they bring to the […]
Read More