CMMC V1.02 – IA.1.077 – Authenticate Identities of Users, Processes, or Devices

The second practice within the Domain, Identification and Authentication (IA) and Capability, Grant access to authenticated entities, is IA.1.077, Authenticate ( or verify ) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.  This sounds a lot more complicated than it actually is.  Essentially, this practice […]

CyberStrength 2017 Conference

According to Timothy Francis, a leader in the cyber insurance field, 62 percent of cyber-breach victims are small and medium-sized businesses. How to Protect Your Small Business as Cybersecurity Threats Rise Small Business Trends Jun 3, 2016 by Larry Alton As digital interaction increases, small businesses have become an increasingly attractive target for cyber criminals […]

Building CyberStrength into your Business

We believe that the cyber threat to small business is real and continuing to grow. Everyday each of us hear of the multiple incidents of cyber attacks hitting businesses around the country. Whether the attacks are criminal in nature, initiated through state actors, or from a lone hacker sitting at their computer, they each can […]