State of CMMC

Hello all,

I wanted to update you all on the current state of CMMC. My sources have been validated and come from not only those on the AB board but Provisional assessors as well. The Cybersecurity Maturity Model Certification’s (CMMC’s) rollout continues but is plagued by bottlenecks and untested assumptions.

How is CMMC different from DFARS?

In the United States, national defense is a huge industrial sector, and it is a point of pride for small businesses in Madison and Huntsville to be doing business with the Department of Defense (DoD). Virtually any company can aspire to become a DoD vendor or service provider, as the national defense program deals with a wide variety of businesses in different sectors.

Building A Secure Enclave to House Sensitive Information

Many industries have regulations that govern how sensitive information is stored, processed, and transmitted. On the top of that list is government contractors working with the Department of Defense. DFARS (Defense Federal Acquisitions Regulation Supplement) and the CMMC (Cyber Security Maturity Model). They have the awesome burden of protecting data that contributes directly to our nation’s security.

4 Reasons you should hire a local MSP

Partnering with a managed IT services provider (MSP) is a great way to acquire specialist-level IT support while conserving money and other resources. There are several locally owned, community-based MSPs in Huntsville and Madison, but you’ll also find that there are many out-of-state providers that tout big benefits because of their scope of operations.

CMMC State of the Union

Current timeline:
Here are our best guesses at the CMMC timeline today.

Very soon: CMMC Scoping Guide will be released by DoD. This should give definitive guidance on what systems need to be assessed, and which network security requirements apply to the systems.

Important takeaways from the Colonial Pipeline ransomware attack

Colonial Pipeline was hacked by the Eastern European cybercriminal gang DarkSide on May 7, 2021. The hackers encrypted Colonial Pipeline's data and demanded ransom in exchange for decryption This compelled Colonial Pipeline’s CEO to pay out over $4.4 million in Bitcoin a few days after the hack, despite the conventional belief that one should not give in to ransomware operators in hopes of retrieving data.

Need help finding ways to reduce business costs? Our FREE eBook has the answer.Learn more here