Security and Compliance

Explore related topics in this category

Microsoft Teams for Heathcare Demo [Video]

Microsoft Teams for Heathcare Demo [Video]

Microsoft teams is a valuable tool in any organization, but once you start looking at specific use cases, you start to see the real power behind the platform...

10 Free Security Resources for Remote Work

10 Free Security Resources for Remote Work

When you consider all the online threats out there (with phishing, Shadow IT, APTs, ransomware, and cryptominers, to name just a few), you must ensure you are employing necessary and effective tools capable of protecting....

Data Governance for Healthcare

Data Governance for Healthcare

In so many industries cloud computing has revolutionized the way we store files and work in the digital space Its not just convenient it also help...

Understanding Active Directory - All Seven Types (Video)

Understanding Active Directory - All Seven Types (Video)

In this Tech Talk Conrad Agramont Agile IT CEO discusses the seven types of Active Directory what to use them for and how they can be used togeth...

NSA Guidance on Mitigating Cloud Vulnerabilities

NSA Guidance on Mitigating Cloud Vulnerabilities

The National Security Agency has released a document on "Mitigating Cloud Vulnerabilities" to the public. It addresses the security risks that are distinctive to cloud services...

CMMC Definitions and Acronyms - A Glossary

CMMC Definitions and Acronyms - A Glossary

ITAR DFARS DIB CMM , CMMC , FCI , CUI , ATP , AOS-G , AOS-G . After a few months of working in any specialized area, particularly within the DoD ...

CMMC Version 1.0 Announced

CMMC Version 1.0 Announced

The Department of Defense has just released Version 1.0 of CMMC , the Cybersecurity Maturity Model Certification program. It will provide the basis for ensuring compliance under ...

How You Can Prepare for CCPA Enforcement

How You Can Prepare for CCPA Enforcement

On October 10 2019 the Office of California Attorney General Xavier Becerra announced public regulations of the California Consumer Privacy Act CC...

Ransomware Protection in Microsoft Office 365

Ransomware Protection in Microsoft Office 365

Ransomware is an increasingly prevalent threat to company networks and data. New threats are emerging every day. That means that you need to protect your entire enterprise. Therefore, use tools meant to prevent....

What is CMMC (Cybersecurity Maturity Model Certification)?

What is CMMC (Cybersecurity Maturity Model Certification)?

The Department of Defense DoD recently announced the introduction of a new program called the Cybersecurity Maturity Model Certification CMMC whi...