Roger Curtis

CMMC Logo

FAR Part 52 and CMMC Level 1 – What Does it Take to be Compliant?

Did you know that contracts with the Department of Defense (DoD), NASA, and GSA will soon include the “Basic Safeguarding of Covered Contractor Information Systems” (Part 52.204-21) clause? This clause, in effect since June 2016, requires government contractors, at a minimum, to enhance their cybersecurity posture by implementing and following the 15 requirements outlined in …

FAR Part 52 and CMMC Level 1 – What Does it Take to be Compliant? Read More »

vCISO Directory

VCISO DIRECTORY

New vCISO Directory Masser Technologies is proud to be listed in “The vCISO Directory“, a new portal where companies can go and “shop” for a vCISO provider in their area. This new one-stop shop can be found here. What is a vCISO you may be asking yourself? A vCISO, or Virtual Chief Information Security Officer, …

VCISO DIRECTORY Read More »

Effective Remediation Services

EFFECTIVE REMEDIATION SERVICES

In today’s world, cyberattacks have become a significant threat to businesses of all sizes. Despite taking precautionary measures, a cyberattack can happen to any organization at any time. These attacks frequently result in significant financial losses and damage to a company’s reputation. If a business cannot recover from a cyberattack quickly, the impact on the …

EFFECTIVE REMEDIATION SERVICES Read More »

Security Consulting and Project Planning

SECURITY CONSULTING AND PROJECT PLANNING

In today’s digital age, cyber threats have become a significant concern for individuals and organizations alike. The increasing number of cyber-attacks, data breaches, and other security incidents have highlighted the importance of a robust security strategy. This is where security consulting and project planning come into the picture. Security consulting involves working with a team …

SECURITY CONSULTING AND PROJECT PLANNING Read More »

In-House cybersecurity risks

IN-HOUSE CYBERSECURITY RISKS

While managing cybersecurity in-house may seem like a cost-effective solution for businesses, it can pose significant risks that can have long-lasting consequences. Cyber threats are constantly evolving, and without access to the latest technology, tools, and expertise, in-house cybersecurity teams may struggle to keep up. Here are some of the risks associated with do-it-yourself, in-house …

IN-HOUSE CYBERSECURITY RISKS Read More »

Security-based Policies and Procedures

SECURITY-BASED POLICIES AND PROCEDURES

Security-based policies and procedures are essential in protecting organizations’ sensitive information from cyber threats. These policies and procedures outline guidelines and best practices that employees must follow to safeguard information and assets from unauthorized access, theft, or compromise. In today’s world, where cyber-attacks have become increasingly sophisticated and frequent, organizations must prioritize implementing these policies …

SECURITY-BASED POLICIES AND PROCEDURES Read More »

Zero Trust

ZERO TRUST

Zero Trust is a security concept emphasizing constant authentication and verification of every device, user, and network communication. This approach assumes that every actor, whether internal or external, is a potential threat and should not be trusted by default. Instead, the Zero Trust model requires organizations to verify and authorize every access request before granting …

ZERO TRUST Read More »

Managing and Securing Endpoints

MANAGING AND SECURING ENDPOINTS

Managing and securing endpoints is crucial for protecting organizations from cyber threats. An endpoint is any device that connects to a network, including laptops, smartphones, tablets, servers, and Internet of Things (IoT) devices. Endpoints are vulnerable to attacks, and a compromised endpoint can lead to data breaches, ransomware attacks, and other security incidents. Effective endpoint …

MANAGING AND SECURING ENDPOINTS Read More »

Mobile Device Management

MOBILE DEVICE MANAGEMENT (MDM)

Mobile devices such as smartphones and tablets have become integral to our personal and professional lives. We use them to connect with colleagues, friends, and family, access sensitive data, and conduct financial transactions. However, the increased use of mobile devices also increases the risk of cyber attacks, making mobile device management (MDM) a crucial tool …

MOBILE DEVICE MANAGEMENT (MDM) Read More »