GSA Begins Process of Aligning Contracts with NIST 800-171

GSA Begins Process of Aligning Contracts with NIST 800-171

GSA Begins Process of Aligning Contracts with NIST 800-171

It’s been assumed for some time now that major components of the government contracting sector would fall in line with NIST standards for safeguarding controlled unclassified information (CUI), namely NIST Special Publication 800-171. Department of Defense was the first to implement the standard, beginning with updates to the Defense Federal Acquisition System (DFARS) contract regulations… read more

Understanding TPISR – The Automotive Industry’s Big Shift towards Information Security

Understanding TPISR - Automotives Big Shift towards Information Security

During the 2017 AIAG Supply Chain Summit, the formation of a new working group tasked with creating a set of information security standards was announced. These standards would be created for use by the OEM’s third-party suppliers and partners, and center around protecting OEM intellectual property during contract fulfillment. Five OEM’s participated in the working… read more

Why Your Small Business Needs Managed Firewall Support

cloud and shield representing a managed firewall service

Firewalls are a crucial line of defense protecting your business from cyberattack. If you own a computer, you probably have some familiarity with using a firewall. At the very least, you’ve probably heard about them and understand that they are important for your computer’s safety. Firewalls block unauthorized access to your computer network by viruses,… read more

New Tools Available to Prime Contractors for Managing NIST 800-171 Compliance

New Tools Available to Prime Contractors for Managing NIST 800-171

In a previous memorandum published by the Under Secretary of Defense, government agencies and acquisition officers have been provided guidance on how to incorporate DFARS and NIST compliance into their solicitations. These include writing NIST 800-171 implementation into statements of work, the source selection process, and bidder instructions. In a new memorandum published on December… read more

Understanding Encryption Key Management for Businesses

michigan nist compliance nist compliance michigan

How to protect and control encryption key access across its lifecycle. Encryption technology is one of the most important security features protecting your data. The use of encryption-in-transit secures email, text, and web data so that users can send and receive information without fear of interception or tampering. Meanwhile, encryption at rest protects data where… read more

The When, Where, and How of Encrypting Data at Rest

Image of hard drive with USB sticks and a lock on top representing encrypting data at rest.

Encryption at rest can protect your data, even if someone steals it. Data security comes in many forms. In order to keep your business safe from a security breach, you need to protect your data from destruction, spying, and outright theft. Protecting yourself requires different lines of defense, and at the forefront of these is… read more

Data Encryption in Transit: What Your Business Needs to Know

At sight disintegrating into ones and zeros showing data encryption in transit.

How can you protect your data as it moves from one location to the next? You’ve probably heard a lot about data encryption. It forms one of the pillars of IT security: without encryption, sensitive business information would be vulnerable to anyone who could steal or intercept it. However, data encryption uses complex algorithms to… read more

How to Improve Network Efficiency Before Upgrading Bandwidth

Image of data resembling fiber optic cables.

Your network is slow. Do you upgrade your bandwidth, or troubleshoot other solutions? As more businesses move toward distributed offices and a greater dependency on the cloud, their ability to efficiently access and transfer large amounts of data becomes ever paramount. This is true not just for businesses that have large files to share, but… read more

IoT Security: Threats, Risk Assessment, and Best Practices

Cloud image of various Wi-Fi enabled devices.

How the Internet of Things adds an extra layer of risk assessment for businesses. Technology experts estimate that by Internet-enabled devices, soon to surpass smartphones, will number over thirty-billion objects by 2020. This Internet of Things (IoT), which includes objects such as thermostats, production sensors, and kitchen appliances, provides one of the top opportunities for… read more