CMMC V1.02 – IA.1.077 – Authenticate Identities of Users, Processes, or Devices

  • Posted by Mark Lupo
  • On June 29, 2020
The second practice within the Domain, Identification and Authentication (IA) and Capability, Grant access to authenticated entities, is IA.1.077, Authenticate ( or verify ) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.  This sounds a lot more complicated than it actually is.  Essentially, this practice […]
Read More
 1

CyberStrength 2017 Conference

  • Posted by Mark Lupo
  • On January 30, 2017
According to Timothy Francis, a leader in the cyber insurance field, 62 percent of cyber-breach victims are small and medium-sized businesses. How to Protect Your Small Business as Cybersecurity Threats Rise Small Business Trends Jun 3, 2016 by Larry Alton As digital interaction increases, small businesses have become an increasingly attractive target for cyber criminals […]
Read More
 

Building CyberStrength into your Business

  • Posted by Mark Lupo
  • On November 4, 2016
We believe that the cyber threat to small business is real and continuing to grow. Everyday each of us hear of the multiple incidents of cyber attacks hitting businesses around the country. Whether the attacks are criminal in nature, initiated through state actors, or from a lone hacker sitting at their computer, they each can […]
Read More
 2