NEWS & UPDATES        

Posts about:

Data Security

mobile device security best practices

Mobile Device Security Best Practices

Mobile devices have become an integral part of our lives, and we use them for various activities like communication, browsing the internet, online transactions, and more. However, they are also vulnerable to security threats like data breaches, malware attacks, and theft. To ensure the security of your mobile devices, you should follow these best practices:

Read More

Small Businesses Are Especially Vulnerable to Ransomware Trends

Small businesses often rely on Managed Service Providers (MSPs) to handle their IT needs including cybersecurity. However, ransomware targets companies of all sizes, and small businesses are especially vulnerable to supply chain attacks. In this July Newsletter of Cyber Security Summit | Minneapolis, MN Scott Singer, President of CyberNINES, shares a few basic strategies for small businesses to protect themselves from ransomware supply chain attacks.

Read More

How to Choose a Password Manager

The problem with passwords is remembering them!  Finding a safe place to keep them is another issue.  That notepad on your desktop isn’t very secure or accessible when you are away from your desk.   There are many password managers available that can help you create and store strong, unique passwords for all of your accounts. Some popular password managers include:

Read More

Cybersecurity Awareness Month: Cyber Security Tips for Working from Home

Cyber Security Tips for Working from Home

The current technologies enable us to control our home devices on our smartphones from any location. While many of us are also working from home, phishing, scams, malware and other cyber-related threats are becoming more frequent. Cybercriminals often rely on human error ― clicking on a malicious link in an email or failing to update the antivirus or install software patches. Cybersecurity is everyone’s job and requires everyone’s participation from the top management to the newest employees. #BeCyberSmart and support the National Cybersecurity Awareness Month (NCSAM) with CyberNINES. Share these tips with your organization and start securing your home environment.

Read More

Scott Singer Featured in a Bloomberg Article

Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense’s (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business Committee on recommendations for making the Cybersecurity Maturity Model Certification (CMMC) compliance attainable for DoD’s small business suppliers, expressed his concerns about the insufficient number of approved Certified 3rd Party Assessment Organizations (C3PAOs) to satisfy the need to certify the defense contractors by the 2025 deadline. There is a need for roughly 8,000 C3PAOs to certify 300,000 companies in the Defense Industrial Base (DIB).

Read More

Webinar Recording: Making CMMC Compliance Affordable for Small and Medium-Sized Businesses

Small and medium businesses represent the majority of DoD contractors in the Defense Industrial Base. Unfortunately, for this vital part of the defense industry, the cost of achieving CMMC compliance is a significant challenge as many contractors are already on a tight budget. The DIB needs to find cost-effective solutions to facilitate CMMC compliance.

Read More

Sign up for the latest News & Updates from CyberNINES!