Blog

What’s The Difference Between Compliance and Ethics?

What’s The Difference Between Compliance and Ethics?

Compliance vs Ethics Featured Image

What’s The Difference Between Compliance and Ethics? As we celebrate Compliance and Ethics Week, we have been thinking about some of the confusion that many people have about the roles that ethics and compliance play in organizations. In this article, we discuss the difference between compliance and ethics, and how they work together and separately… read more

URGENT: DOJ to Start Pursuing Government Contractors who Falsify Cybersecurity Practices

Urgent: DOJ to Start Pursuing Government Contractors who Falsify Cybersecurity Practices

The United States Department of Justice (DOJ) has announced that it will start holding companies that have government contracts—and receive federal funding—accountable if they’ve put US information or systems at risk.  Using the False Claims Act, the Civil Cyber-Fraud Initiative will seek out cybersecurity fraud committed by companies receiving federal grants and contracts. This announcement… read more

Why Old Hardware Is a Security Threat

Why Old Hardware Is a Security Threat

Many of us understand that outdated software has known security vulnerabilities. What about hardware? When most of us think about cybersecurity vulnerabilities, the threats that come to mind are those that target software. These are not only the most apparent to the average user, they’re also the ones that frequently make headlines. For many businesses,… read more

How to Ensure Your Team Is Trained to Handle Cybersecurity

how to ensure your team is trained to handle cybersecurity

Human error is a leading cause of security breaches within companies. Training can help. Cyber attacks come in many forms. Some seek to exploit vulnerabilities in a program’s code, while others attack a network’s infrastructure. But by far the most common strategy is to target weaknesses in human behavior—moments when we are tired, forgetful, stressed,… read more

What CMMC Maturity Level Does Your Business Model Need?

What CMMC Maturity Level does your Business Model Need

If your business plans to work with the DoD, you will need to meet the appropriate level of cybersecurity preparedness. With each year bringing an increase in the number and sophistication of cyberattacks, the DoD has made an ongoing priority to improve security around its network of suppliers and contractors, especially with regard to Federal… read more

Brightline Named Best and Brightest for Fourth Time

Brightline named best and brightest

Brightline is a 2021 Winner in Metro Detroit’s Best and Brightest Companies to Work For program. For the fourth consecutive year, we at Brightline Technologies are proud to announce that we’ve been named a winner in the Metropolitan Detroit’s Best and Brightest Companies to Work For competition. Each year, we strive to provide a workplace… read more

Do You Know Your NIST SP 800-171 SPRS Score?

Do You Know Your NIST SP 800-171 SPRS Score

Posting an accurate self-assessment of your Supplier Performance Risk System (SPRS) score is the new DFARS requirement as the DoD reviews CMMC compliance standards. Ever since NIST SP 800-171r2 requirements were published, businesses across the country who want to continue filling DoD contracts have been steadily updating their security controls in order to meet the… read more

How Microsoft Office 365 Empowers the Modern Workplace

How Microsoft Office 365 Empowers the Modern Workplace

Work has changed. Here’s how Microsoft Office 365 is helping offices keep up. For decades, the workplace has undergone gradual changes as businesses have moved from analog systems to digital systems, and then from local networks to cloud-based networks. Each new stage has required new investments in IT infrastructure, and businesses have thrived or floundered… read more

New Phishing Attacks on the Rise in 2021

New Phishing Attacks on the Rise in 2021.

Organizations are noticing an increase in targeted phishing attacks. Here’s how to prepare your staff. If you’ve noticed an increase in phishing attacks lately—in your email inbox, on your social media profiles, and especially as texts to your cell phone—you’re not alone. Back in September, Security Magazine posted an article describing research that showed a… read more