Author Archives: John Renders

two women talking while looking at laptop

How to Achieve HIPAA Compliance in Michigan

With the highly sensitive information that gets shared between patients and their healthcare providers, the healthcare industry is a goldmine for cybercriminals. The Health Insurance Portability and Accountability Act (HIPAA) was designed to protect this data from being mishandled or stolen. If you are a Michigan-based business that deals with protected health information (PHI), then […]
two business people consulting

Who Needs to Be CMMC Compliant?

Every industry has codes they need to stick by—and the Department of Defense is no different. In order to ensure the safety and security of all information that could potentially fall into enemy hands, the DoD requires certain businesses to follow the guidelines in the Cybersecurity Maturity Model Certification, or CMMC. What Is CMMC? The […]
software developer writing and smiling

What Changes Did CMMC 2.0 Introduce?

As an IT company, we understand the need for tight cybersecurity measures and standards. But sometimes, all the compliance regulations can blend together in a giant mess! That’s why we’re here to help you understand the changes to CMMC 2.0 and how the expectations have been streamlined. In November of 2021, the Department of Defense […]
business professionals discussing charts

Understanding Compliance: Which Regulations Apply to My Business?

When it comes to understanding compliance, there are a lot of different regulations that can apply to your business. It can be difficult to keep track of them all, and even more challenging to ensure that your business is compliant with them. In this blog post, we will go over some of the most common […]
IT professional using an calculator

How to Find a CMMC Compliance Consultant

The murky world of compliance can be overwhelming for many small and medium-sized businesses, especially in strictly controlled industries with continual updates made to government controls. How do you really know that your current compliance practices are adequate to protect your business from a data breach and comprehensive enough to pass an audit? How can […]
New Phishing Attacks on the Rise in 2021.

New Phishing Attacks on the Rise in 2021

Organizations are noticing an increase in targeted phishing attacks. Here’s how to prepare your staff. If you’ve noticed an increase in phishing attacks lately—in your email inbox, on your social media profiles, and especially as texts to your cell phone—you’re not alone. Back in September, Security Magazine posted an article describing research that showed a […]
Top 6 Cybersecurity Hacks and Data Leaks of 2020

Top 6 Cybersecurity Hacks and Data Leaks of 2020

In a year when businesses around the world took their operations fully online, cybersecurity is more important than ever. It seems that every year brings with it a new list of major cybersecurity failures, from successful phishing schemes to exploited vulnerabilities to accidental leaks of customer information to the public. This year has been no […]
remote security

7 IT Security Tips for Protecting Remote Workers

How businesses can improve their IT security while their employees work remotely. With each year, IT security for businesses becomes more complex as new security threats emerge and new technologies adapt to combat them. However, these threats don’t just come from new malware, viruses or exploitable software vulnerabilities. They also come from changes in human […]