NEWS & UPDATES        

Penetration Test Versus Vulnerability Scan

What’s the Difference Between a Vulnerability Scan and a PEN Test?

We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test.  We’ve created this table below to show the differences. 
 
Basically, a  vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities.
 
A penetration test is a detailed hands-on examination by an actual person that tries to detect and exploit weaknesses in your system.
 
These tests are good steps to maintain Cybersecurity compliance
Read More

Scott Singer Featured in a Bloomberg Article

Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense’s (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business Committee on recommendations for making the Cybersecurity Maturity Model Certification (CMMC) compliance attainable for DoD’s small business suppliers, expressed his concerns about the insufficient number of approved Certified 3rd Party Assessment Organizations (C3PAOs) to satisfy the need to certify the defense contractors by the 2025 deadline. There is a need for roughly 8,000 C3PAOs to certify 300,000 companies in the Defense Industrial Base (DIB).

Read More

Webinar Recording: Making CMMC Compliance Affordable for Small and Medium-Sized Businesses

Small and medium businesses represent the majority of DoD contractors in the Defense Industrial Base. Unfortunately, for this vital part of the defense industry, the cost of achieving CMMC compliance is a significant challenge as many contractors are already on a tight budget. The DIB needs to find cost-effective solutions to facilitate CMMC compliance.

Read More

CyberNINES Expands to California

CMMC & NIST SP 800-171 Compliance & Cybersecurity Consulting Firm, CyberNINES, Expands in California  

MADISON, WIS. (July 30, 2021) — CyberNINES, a cybersecurity consulting company providing high-value and affordable CMMC & NIST SP 800-171 compliance services for small and medium-sized businesses in the Upper Midwest, has recently expanded its presence in California. Scott Singer, President of CyberNINES, Todd Streicher, Vice President of Business Development, and Nick Alaga, Director of Business Development in Western Region, met this past month with businesses and partners in San Francisco, Los Angeles, and San Diego to discuss the strategic development in the West region.

Read More

Small Businesses Are Especially Vulnerable to Ransomware Trends

Small businesses often rely on Managed Service Providers (MSPs) to handle their IT needs including cybersecurity. However, ransomware targets companies of all sizes, and small businesses are especially vulnerable to supply chain attacks. In this July Newsletter of Cyber Security Summit | Minneapolis, MN Scott Singer, President of CyberNINES, shares a few basic strategies for small businesses to protect themselves from ransomware supply chain attacks.

Read More

Protect Your Company from a Ransomware Attack

OVERVIEW 

Ransomware has become more prevalent than ever, and predictions are that it will continue to be a major form of cybercrime in the coming years. Ransomware is a type of malware designed to encrypt files or even entire drives so that the business infected can no longer access these files or systems without the key to unlock the encryption, which of course is not available unless a ransom is paid, almost always via a cryptocurrency. This can have a devastating effect on the attacked organization, creating an atmosphere of desperation, that can be mitigated with the preparation or avoided altogether with strategic prevention. 

Read More

Sign up for the latest News & Updates from CyberNINES!