The Time Is Now: Convergence of Cyber and Physical Security
How do cybersecurity and physical security differ? The answer is, they don’t—not anymore. They’re increasingly becoming the same thing.
Posts about:
How do cybersecurity and physical security differ? The answer is, they don’t—not anymore. They’re increasingly becoming the same thing.
On the 27th of February FEMA announced the Fiscal Year 2024 Financial Assistance/Subsidy Arrangement for private property insurers interested in participating in the National Flood Insurance Program’s (NFIP) Write Your Own (WYO) Program. This announcement contains specific requirements regarding cybersecurity, which need to be attained by private insurance companies participating in NFIP’s WYO.
Mobile security refers to the protection of mobile devices such as smartphones, tablets, and wearables from threats such as malware, hacking, theft, and unauthorized access. It involves implementing measures and strategies that ensure the safety and privacy of sensitive data and information stored on mobile devices.
Mobile devices have become an integral part of our lives, and we use them for various activities like communication, browsing the internet, online transactions, and more. However, they are also vulnerable to security threats like data breaches, malware attacks, and theft. To ensure the security of your mobile devices, you should follow these best practices:
The Department of Defense’s (DoD) Interim Final Rule that went into effect on 30 November 2020, requires both primes and sub-contractors to submit their NIST SP 800-171 assessment score to the Supplier Performance Risk System (SPRS). While the rule will only impact new contracts, the DoD plans to do 148 Medium Assessments and 81 High Assessments over the next three years, with an estimated 8,823 basic assessment scores to be uploaded on SPRS each year to award new contracts to small businesses. At CyberNINES, we are aware of these changes and committed to helping small and medium-sized businesses accept purchase orders from the DoD and Prime Contractors.
CyberNINES CEO Scott Singer was last week’s guest on the always informative YouTube channel, 123CMMC - Cyber Security with Dana Mantilia speaking on “How To Prepare For the DIBCAC Assessment In Order To Avoid Questions”.
Check out the interview here! 123CMMC Interview
The problem with passwords is remembering them! Finding a safe place to keep them is another issue. That notepad on your desktop isn’t very secure or accessible when you are away from your desk. There are many password managers available that can help you create and store strong, unique passwords for all of your accounts. Some popular password managers include:
CyberNINES in partnership with Wisconsin Economic Development Corporation, Wisconsin Center for Manufacturing and Productivity (WCMP) and the Wisconsin Procurement Institute hosted a free in-person & virtual workshop where attendees were able to engage with some of the best cybersecurity resources in Wisconsin! |
Do you currently provide your employee's security education?