top of page

IT &

CYBERSECURITY

News Articles, Data and More

CMMC 2.0 Overview

The Cybersecurity Maturity Model Certification (CMMC) program enhances cyber protection standards for companies in the Defense Industrial Base.  It is designed to protect sensitive unclassified information that is shared by the Department with its contractors and subcontractors.

One in Five Manufacturing Firms Targeted by Cyberattacks

Information-stealing malware makes up about a third of attacks, a study finds,

but companies worry most about ransomware shutting down production.  Cybercriminals and attack groups continue to target manufacturers, with about one in five companies in the sector compromised in a successful attack, according to a survey published by security firm Morphisec.

Cost of a Data Breach
Report (2024)

– IBM Security

  • $4.88m - Average total cost of ransomware breach

  • 292 days - Average time to identify and contain a breach

  • U.S. was the top country for average total cost of a data breach ($9.36m) for 14th consecutive year

View the full report and findings HERE.

4 Cybersecurity Vulnerabilities for Machine Shops

The Industrial Internet of Things (IIoT) could help small-to-medium-sized machine shops maintain higher levels of productivity than was possible without that connected technology. However, as these entities invest in advanced networking and high-tech equipment, they also must remain aware of cybersecurity threats. Here are four frequent risks that deserve attention.

CNC Machining Security QuickStart Guide

This guide is used in the design of security controls implemented around CNC machines and their networks. This guide is not a full step-by-step process for setting up security around CNC machines, but is to be used as a starting point to begin analyzing a client’s network and facility to determine the types of controls needed for securing CNC machines.

Cybersecurity Best Practices

– CISA

  • Recognize & Report Phishing

  • Use Strong Passwords

  • Turn on Multifactor Authentication

  • Update Software Regularly

For more information click HERE.

Events, Trainings and Activities

2024 (3).png

Hosted and Presented by

SSE Logo_edited.png

CMMC Final Rule Effective 12/16/24 – What Companies Need to Prepare for NOW and Heading into 2024

Wednesday, December 11th, 2024  |  11:00AM – 12:00PM CT

Are You Ready for the New CMMC Final Rule?

Join us for an essential webinar as we break down the requirements of the Cybersecurity Maturity Model Certification (CMMC) Title 32 Final Rule, effective December 16, 2024. Our cybersecurity experts will guide you through what your organization needs to know and implement heading into 2025.

 

Key Topics:

Comprehensive Overview of Final Rules

  • Title 32 CFR requirements and effective date

  • Title 48 CFR update

 

Strategic Implementation Timeline

  • Critical deadlines and milestones

  • Expected phased rollout

  • Key preparation steps for 2025

 

Understanding Key Roles

  • Managed Service Providers (MSPs)

  • Cloud Service Providers (CSPs)

  • External Service Providers (ESPs)

  • Integration and compliance responsibilities

 

Risk Management

  • Consequences of non-compliance

  • Contract eligibility impact

  • Criminal & civil penalties

  • Mitigation strategies

On-Demand Trainings, Workshops, and Courses – CISA

MAM Members, Partners and Industry Suppliers who specialize in IT and Cybersecurity solutions.

MAM Resources

SSE Logo_edited.png

SSE, Inc.

Cybersecurity, compliance and technology services for manufacturers, with an emphasis on Dept. of Defense contracts (NIST 800-171 / CMMC Compliance).

schedule network scan.JPG
schedule cmmc assessment.JPG

Check out SSE's array of blogs and white papers for tips, trends and best practices.

CLICK HERE

Stronghold NCT by-line RGB full color.png

Stronghold Data

Managed IT Services, Business Continuity, Information Security, Enterprise Solutions, IT Consulting, Cloud Services and IT Support.

​

Special Microsoft Offer for MAM Members.

Click here to learn more!

MacKinney-Systems-logo-white.png

MacKinney Systems

Mainframe software, security, printing and utilities, data management, session management and more.

ATB Technologies Logo.png

ATB Technologies

Managed IT, Business Data Analysis and Cloud services.

DaZZee IT Services

Managed IT, Fortify IT, AI/Automation, and Datalytics services.

bottom of page