Category: IT & Cybersecurity

CMMC 2.0 Best Practices Series: Role Based Cyber Awareness Training

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Creating A Good Contingency Plan

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Choosing the Right Cyber Insurance Provider

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Selecting an Digital Rights Management and Data Loss Prevention Provider

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Selecting an Endpoint Detection Response Platform

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Selecting an Identity Management Provider

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Selecting a Cloud Based Spam Filter

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Selecting A Next Generation Firewall

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Core Network And User Policies

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Key IT and Cybersecurity Management Tools

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

CMMC 2.0 Best Practices Series: Selecting Good Backup Providers

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

Department of Defense’s New Cybersecurity Requirements Explained for Subcontractors

In 2021, the Department of Defense announced a new strategic effort to provide enhanced cyber security efforts for their building projects going forward. The Cybersecurity Maturity Model Certification (CMMC) will ensure accountability for companies to implement cybersecurity standards in order to protect sensitive data during the design, build and operations of DoD facilities. 

Recently, the DoD has simplified and revised the CMMC to make it more streamlined and faster in what they are calling, “CMMC 2.0”. The new version helps to cut the red tape for small and medium sized businesses, sets priorities for protecting information and updates the requirements to address the evolving cyber threats and best practices. 

Through research grants by the John R. Gentille Foundation and Electri Foundation, a video series has been produced by MCAA’s Chief Security Fanatic, Nick Espinosa to provide an update on the process.

The project includes an in-depth overview of the CMMC 2.0 revision. Short videos of best practices regarding the CMMC will continue to be added as the program evolves. 

Department of Labor Cybersecurity Best Practices for ERISA-Covered Plans

ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks. The Employee Benefits Security Administration has prepared the following best practices for use by recordkeepers and other service providers responsible for plan-related IT systems and data, and for plan fiduciaries making prudent decisions on the service providers they should hire.

The Business Value of BIM for Mechanical and HVAC Construction SmartMarket Report

The use of BIM and related technologies and processes that leverage data from models is delivering meaningful impact to mechanical and HVAC contractors on a wide variety of measures, including cost and schedule improvements, enhanced productivity, better collaboration between stakeholders and better worker safety. This research report quantifies other benefits to users and the challenges related to leveraging BIM to increase industry understanding of which factors will most effectively drive growth and expand future use.

Prefabrication and Modular Construction 2020 SmartMarket Report

Improved productivity and quality are among the benefits driving interest in, and use of, prefabrication and modular construction today. This research report quantifies other benefits to users and the challenges related to each to increase industry understanding of which factors will most effectively drive growth and expand future use.

Exposed: Keeping Your Data to Yourself After an IT Breach

Keep your data private after an IT breach. Three types of cyber threats have been on the rise in business; each requires your leadership skills to help your company avoid them or emerge unscathed. Find out what you can do as an executive to protect your company if your website is hacked and defaced, if your files are held for ransom or if your Data Center goes offline with no estimate for restoration.