Is your business for sale without your knowledge?

Posted by IMEC on Aug 10, 2021 2:12:49 PM

Original article, written by Eric Reiger, Founder/President of WEBIT Services, Inc.

Welcome to the next-level threat facing American businesses. The bad guys have organized and they are now selling access to corporate networks they have already breached (without detection) to other groups of bad guys.

+

Cybersecurity Tactics to Take Right Now

Posted by IMEC on Jul 30, 2021 9:32:33 AM

This is an original article from Cre8tive Technology and Design.

+

Commonly Misused Terms in Cybersecurity

Posted by IMEC on Jun 28, 2021 1:10:01 PM

Written by Celia Paulsen, NIST MEP Cybersecurity Services Specialist.

Words are hard. English is hard. How we manage to communicate anything is nigh a miracle.

Sometimes I wish I was Oscar Wilde or Mark Twain or any of the other great authors who seem to be able to effortlessly describe a character or a scenario so that the reader can envision perfectly what they mean.

+

Maintaining Your Online Privacy

Posted by IMEC on Jun 22, 2021 12:46:48 PM

This is an original article from NIST Manufacturing Innovation Blog.

It might not be the most important subject on your mind when running your business, but online privacy is becoming increasingly important as we move closer to a fully internet-connected world.

+

Steps to Take to Prepare for CMMC Compliance

Posted by IMEC on Jun 15, 2021 8:13:00 AM

This is an original article from Cre8tive Technology and Design.

Find the CMMC Level Needed For Your Business

There are five different tiers of CMMC, depending on your level of involvement with the federal government. The levels of CMMC range from “Basic Cybersecurity Hygiene” all the way up to “Advanced/Progressive.” The level of CMMC that you may need for your business will depend if contracts you want to bid on have to do with classified or unclassified DoD information. The level of CMMC required for contracts will be defined in Requests, for Information and Requests for Proposals provided by the DoD.

+

What A&D Manufacturers Need to Know About CMMC

Posted by IMEC on Jun 10, 2021 9:12:50 AM

This is an original article from Cre8tive Technology and Design.

Aerospace and Defense manufacturers are well aware of the certifications and audits they have to go through in order to operate. The Department of Defense is now starting to require the Cybersecurity Maturity Model Certification, or CMMC.

+

Cybersecurity Resources for Manufacturers

Posted by IMEC on Jun 8, 2021 5:30:17 PM

Cyber risk is a clear and present danger to manufacturers. The threat is real and the impact can be damaging to a manufacturer’s reputation, operations and finances. Is your company doing everything possible to prevent cyber attacks?

+

Data Breach Notification Laws: How to Manufacture a Confident Response

Posted by IMEC on May 25, 2021 4:32:32 PM

Written by Robert Barnes, Administrative Assistant with the NIST MEP Extension Services Division.

+

What is the Difference Between CMMC, DFARS, and NIST 800-171?

Posted by IMEC on Sep 15, 2020 11:47:13 AM

This is an original post by Roisin Coleman of Alpine Security.

Without Cybersecurity Maturity Model Certificate (CMMC) compliance, a contractor will be barred from all future Department of Defense (DoD) contracts. The CMMC officially launched in January 2020, building upon the DFARS and NIST 800-171 standards with additional requirements for vendors working with the DoD. Understanding CMMC and how it differs from DFARS and NIST 800-171 is crucial to the current and future success of government contractors.

+

20 Cybersecurity Statistics Manufacturers Can’t Ignore

Posted by IMEC on Mar 6, 2020 2:01:05 PM

This is an original article from NIST Manufacturing Innovation Blog.

Cybersecurity threats are a huge business risk for all companies. Small and medium-sized businesses (SMBs) — including manufacturers — are especially vulnerable to attacks. Small and medium-sized manufacturers (SMMs) are often seen as an easy entry point — a “soft” target — into larger businesses and government agencies. One of the first steps when prioritizing how to manage your business risk is to gather information about the threat environment. The 20 important (and shocking) cybersecurity statistics listed below focus on what manufacturers need to know about the “what” and “so what” of cybersecurity, so they can start planning their “now what” actions.

+

    Subscribe to Email Updates:

    Stay Connected:

    Posts by Category