top of page

IT &

CYBERSECURITY

CMMC 2.0 Overview

The Cybersecurity Maturity Model Certification (CMMC) program enhances cyber protection standards for companies in the Defense Industrial Base.  It is designed to protect sensitive unclassified information that is shared by the Department with its contractors and subcontractors.

4 Cybersecurity Vulnerabilities for Machine Shops

The Industrial Internet of Things (IIoT) could help small-to-medium-sized machine shops maintain higher levels of productivity than was possible without that connected technology. However, as these entities invest in advanced networking and high-tech equipment, they also must remain aware of cybersecurity threats. Here are four frequent risks that deserve attention.

One in Five Manufacturing Firms Targeted by Cyberattacks

Information-stealing malware makes up about a third of attacks, a study finds,

but companies worry most about ransomware shutting down production.  Cybercriminals and attack groups continue to target manufacturers, with about one in five companies in the sector compromised in a successful attack, according to a survey published by security firm Morphisec.

CNC Machining Security QuickStart Guide

This guide is used in the design of security controls implemented around CNC machines and their networks. This guide is not a full step-by-step process for setting up security around CNC machines, but is to be used as a starting point to begin analyzing a client’s network and facility to determine the types of controls needed for securing CNC machines.

5 Key Cybersecurity Considerations Heading Into 2022

In a lot of ways, 2022 is going to be an exciting time for cybersecurity, but there are also a lot of things that should be on your radar heading into the new year. Read on to learn more about our 2022 cybersecurity considerations.

Cybersecurity Maturity Model Certification RESOURCES

The Cybersecurity Maturity Model Certification (CMMC) program enhances cyber protection standards for companies in the Defense Industrial Base (DIB). It is designed to protect sensitive unclassified information that is shared by the Department with its contractors and subcontractors. The program incorporates a set of cybersecurity requirements into acquisition programs and provides the Department increased assurance that contractors and subcontractors are meeting these requirements.

CMMC Model Overview

Version 2.0 - December 2021

CMMC Assessment Guide; Level 2

Version 2.0 - December 2021

CMMC Self-Assessment Guide

Version 2.0 - December 2021

CMMC Glossary and Acronyms

Version 2.0 - December 2021

Information available at 

Acquisition & Sustainment

Office of the Under Secretary of Defense WEBSITE

Partner Resources and Information

Cybersecurity Best Practices.png
Disaster Recovery Test Plan.png
Email Security Best Practices.png
Human Factors in Cybersecurity.png
Social Engineering.png
Key Updates CMMC 2.0.png
Six Steps CMMC Compliance.png
WTK Before NIST Assessment.png
DOJ to Federal Contractors.png
Tips for CMMC Compliance.png
More on CMMC 2.0
schedule cmmc assessment.JPG
schedule network scan.JPG
– IBM Security
  • $4.62m - Average total cost of ransomware breach

  • 287 days - Average time to identify and contain a breach

  • U.S. was the top country for average total cost of a data breach ($9.05m) for 11th consecutive year

​

View the full report and findings HERE.

Cost of a Data Breach
Report (2021)

Quick Tips

Cybersecurity at Work

Social Media

Cybersecurity

Passwords

Identity Theft & Internet

Scams

DFARS Interim Final Rule issued by the Depart. of Defense requires mandatory, scored self-assessments for NIST 800-171 and creates a bridge to Cybersecurity Maturity Model Certification (CMMC).

WhatIsAPoam_FeatureImage-495x400.png

What Is
A POAM?

CMMC Compliance Made Easy

SSE one pager (front).PNG
bottom of page