Author Archives: Brightline IT

two women talking while looking at laptop

How to Achieve HIPAA Compliance in Michigan

With the highly sensitive information that gets shared between patients and their healthcare providers, the healthcare industry is a goldmine for cybercriminals. The Health Insurance Portability and Accountability Act (HIPAA) was designed to protect this data from being mishandled or stolen. If you are a Michigan-based business that deals with protected health information (PHI), then […]
two business people consulting

Who Needs to Be CMMC Compliant?

Every industry has codes they need to stick by—and the Department of Defense is no different. In order to ensure the safety and security of all information that could potentially fall into enemy hands, the DoD requires certain businesses to follow the guidelines in the Cybersecurity Maturity Model Certification, or CMMC. What Is CMMC? The […]
communication

How Everbridge Mass Notification Services Help Your Business

Clear communication can mean the difference between life and death during an emergency. Even if the situation isn’t that serious, it can save your business the time and productivity that’s lost during a crisis. That’s where Everbridge comes in. They are the global leader in critical event management, providing powerful software that helps organizations automate […]
software developer writing and smiling

What Changes Did CMMC 2.0 Introduce?

As an IT company, we understand the need for tight cybersecurity measures and standards. But sometimes, all the compliance regulations can blend together in a giant mess! That’s why we’re here to help you understand the changes to CMMC 2.0 and how the expectations have been streamlined. In November of 2021, the Department of Defense […]
cybersecurity, lock on keyboard

A Beginner’s Guide to NIST Compliance & the Steps Businesses Need to Comply

Every industry has a set of suggestions or guidelines that they recommend businesses follow in order to help ensure the safety and security of their products or services. For example, the National Institute of Standards and Technology (NIST) is a non-regulatory agency of the United States Department of Commerce that provides recommendations for how businesses […]
Urgent: DOJ to Start Pursuing Government Contractors who Falsify Cybersecurity Practices

URGENT: DOJ to Start Pursuing Government Contractors who Falsify Cybersecurity Practices

The United States Department of Justice (DOJ) has announced that it will start holding companies that have government contracts—and receive federal funding—accountable if they’ve put US information or systems at risk.  Using the False Claims Act, the Civil Cyber-Fraud Initiative will seek out cybersecurity fraud committed by companies receiving federal grants and contracts. This announcement […]
Why Old Hardware Is a Security Threat

Why Old Hardware Is a Security Threat

Many of us understand that outdated software has known security vulnerabilities. What about hardware? When most of us think about cybersecurity vulnerabilities, the threats that come to mind are those that target software. These are not only the most apparent to the average user, they’re also the ones that frequently make headlines. For many businesses, […]