Cybersecurity Maturity Model Certification (CMMC) Version 1.0 Released

Posted by IMEC on Feb 13, 2020 11:01:29 AM

With the release of version 1.0 of the CMMC framework, the DoD will being to include these certification requirements in new DoD solicitations, beginning in the fall of 2020.

The inforgraphic below provides a high-level look at what the Cybersecurity Maturity Model Certification (CMMC) means for DoD contactors. It offers steps contractors can take to prepare for CMMC, important dates and descriptions of practices and processes required to achieve each of the 5 levels of CMMC certification.

+

The 5 Common Cybersecurity Threats to Manufacturers

Posted by IMEC on Oct 17, 2019 11:37:58 AM

This is an original article written by Elliot Forsyth, Vice President of Business Operations at the Michigan Manufacturing Technology Center (The Center), part of the MEP National Network.

+

Regional Workforce Conference at JWCC to Help Companies Address Labor Shortage and Adapt for the Future

Posted by IMEC on Sep 3, 2019 10:50:00 AM

Contributed by our partners at John Wood Community College.

Regional companies will learn practical ways to adapt for the future at the “ABC’s of a Thriving Workforce” conference set for Tuesday, September 24 from 9a.m. to 2:30 p.m. at John Wood Community College’s auditorium in Quincy.

+

Protecting Internet Communications

Posted by IMEC on Aug 16, 2019 10:52:53 AM

This is an original article written by Michael Allbritton, Cybersecurity Analyst and Trainer with Alpine Security. 

Introduction

Today we all communicate constantly over the internet. Some people say we spend too much time on our mobile devices, and we do not interact enough with the world, and with the people around us. However, that is a discussion for another time. In this blog post we want to discuss how we keep our internet communications secure from eavesdropping.

+

Incident Response Plan: The Tool You Hope You Never Need

Posted by Simone Erskine on May 15, 2019 12:55:00 PM

This is an original article written by Isaac Wright, a Cybersecurity Analyst and Trainer at Alpine Security.

It’s no question that in cybersecurity, defense is the best defense. In the constantly changing threat landscape, the tie often goes to the attacker, and businesses are forced to act like turtles putting up shells of security to ward off threats.  That is not always a bad thing; using a well-constructed defense- in- depth plan can greatly limit the likelihood of a successful attack.  I would like to believe we can get to a 99.99% level of security.  Even if that were true, that extra .01% keeps me up at night. What do we do if the controls fail? How do we respond then? What do we do the other 1% of the time? Once we find out that our emails have been hacked, or our money has been stolen is not the time to ask, “what now?” Even worse, what do you do when you suspect that an insider has embezzled funds and the evidence is located on their computer? Though we invest in and rely on our security controls, it is unfortunately not always enough.  We must have a plan for the .01%.

+

Cybersecurity: It's Only One Piece of the Business Security Puzzle

Posted by John Remsey on Feb 25, 2019 9:42:00 AM

Cybersecurity continues to be a hot topic for manufacturers – and rightfully so! According to the State of Industrial Cybersecurity 2018 by Kaspersky, “Over three quarters of the companies surveyed state that it is very likely or at least quite likely to become a target of a cybersecurity attack in the operational technology and industrial cybersecurity space. Despite this, only 23% are compliant with minimal mandatory industry or government guidance and regulations around cybersecurity of industrial control systems.”

+

5 Questions to Ask Your Cybersecurity Professional

Posted by Simone Erskine on Oct 18, 2018 12:41:37 PM

This is an original article by Kathleen Martin, MEP's IT Security Officer and a Certified Information System Security Professional.

Almost weekly we hear about another company or organization that has fallen victim to a cyber-attack. We know cybercriminals are more persistent and we need to be more diligent about protecting information.

+

Dealing with Cyber Attacks–Steps You Need to Know

Posted by Emily Lee on Aug 27, 2018 3:23:14 PM

This is an original article by Elliot Forsyth, Vice President of Business Operations at the Michigan Manufacturing Technology Center, part of the MEP National NetworkTM.

Any business owner knows that information is a vital part of running a company. As manufacturing increasingly becomes more digitized, cybersecurity must become a standard component of doing business. If sensitive information—such as employee records, customer transactions or proprietary data—is comprised, it can have a devastating effect.

That’s why more and more manufacturers are taking steps to protect their information via good information security practices.

+

Nobody Likes a Compliance Audit... and Why You Should Do Them Anyway!

Posted by Simone Erskine on Aug 7, 2018 2:33:46 PM

This is an original article written by Jana White, Cybersecurity Engineer and Trainer with Alpine Security.

What Is a Compliance Audit?

A compliance audit is an examination of documentation, records, or other evidentiary artifacts that use a specific set of regulatory controls to determine compliance. There are many different types of compliance audits including financial, technical, and cybersecurity audits. Common compliance audits include HIPAA, PCI-DSS, and SOC. 
+

Spot and Stop Phishing Emails

Posted by Simone Erskine on Jul 23, 2018 10:41:16 AM

 

Email is such a seamless part of everyday life that it is easy to take for granted just how vulnerable anyone can be to a well-crafted effort to steal your identity or confidential financial information. One of the most effective methods used by hackers is phishing, which entails trying to trick you into clicking on a link or attachment in an email. Instead of the attachment you thought you were opening, you have inadvertently opened the door to hacking from an outside source, usually without your knowledge.

+

    Subscribe to Email Updates:

    Stay Connected:

    Posts by Category