NEWS & UPDATES        

Posts about:

cybersecurity

Penetration Test Versus Vulnerability Scan

What’s the Difference Between a Vulnerability Scan and a PEN Test?

We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test.  We’ve created this table below to show the differences. 
 
Basically, a  vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities.
 
A penetration test is a detailed hands-on examination by an actual person that tries to detect and exploit weaknesses in your system.
 
These tests are good steps to maintain Cybersecurity compliance
Read More
Cybernines discusses new Cyber rules for FEMA NFIPs

Cyber changes come to FEMA's NFIP

On the 27th of February FEMA announced the Fiscal Year 2024 Financial Assistance/Subsidy Arrangement for private property insurers interested in participating in the National Flood Insurance Program’s (NFIP) Write Your Own (WYO) Program. This announcement contains specific requirements regarding cybersecurity, which need to be attained by private insurance companies participating in NFIP’s WYO. 

Read More
mobile device security best practices

Mobile Device Security Best Practices

Mobile devices have become an integral part of our lives, and we use them for various activities like communication, browsing the internet, online transactions, and more. However, they are also vulnerable to security threats like data breaches, malware attacks, and theft. To ensure the security of your mobile devices, you should follow these best practices:

Read More

How to Submit a NIST Score?

The Department of Defense’s (DoD) Interim Final Rule that went into effect on 30 November 2020, requires both primes and sub-contractors to submit their NIST SP 800-171 assessment score to the Supplier Performance Risk System (SPRS). While the rule will only impact new contracts, the DoD plans to do 148 Medium Assessments and 81 High Assessments over the next three years, with an estimated 8,823 basic assessment scores to be uploaded on SPRS each year to award new contracts to small businesses. At CyberNINES, we are aware of these changes and committed to helping small and medium-sized businesses accept purchase orders from the DoD and Prime Contractors.   

Read More

How to Choose a Password Manager

The problem with passwords is remembering them!  Finding a safe place to keep them is another issue.  That notepad on your desktop isn’t very secure or accessible when you are away from your desk.   There are many password managers available that can help you create and store strong, unique passwords for all of your accounts. Some popular password managers include:

Read More

Sign up for the latest News & Updates from CyberNINES!