-
Baseline Configurations: The First Step in Configuration Management
The Configuration Management (CM) domain in NIST SP 800-171 requires organizations to create and maintain baseline configurations and inventories for all their systems that includes hardware, software, firmware,…
4 min read
-
Multi-factor Authentication (MFA) and How to Thwart Bypass Attacks
Multi-Factor Authentication (MFA) significantly strengthens security for businesses and individuals by adding extra layers of verification before granting access to accounts or devices. Instead of relying on just…
4 min read
-
Part 2: Your Guide for Continuous Monitoring and Ongoing Maintenance
In part one, we talked about what a Continuous Monitoring and Ongoing Maintenance Program should entail. Another huge part of the plan is to create a schedule to…
4 min read
-
Your Guide to Continuous Monitoring and Ongoing Maintenance for CMMC
As most of us have figured out, compliance isn’t a one-time, set it and forget it kind of thing; it’s an ongoing commitment. With systems and threats always…
4 min read