What is a Managed Security Service Provider?

A managed security service provider (MSSP) is a third-party organization contracted by a business to manage and monitor security devices, protecting the companies’ digital assets and infrastructures. MSSP technology offerings include secure web application firewalls, intrusion detection, spam blocking, Virtual Private Networks (VPN) system management, virus protection, as well as identity and privileged access management.

Learn More


Cybersecurity Risks: Why You Should Care

To most people, the internet just exists. Information gets sent out into the void, your website just runs, and you use it daily to send a few emails. When it comes to the cybersecurity side of things, the usual tactic is to send any issues along to the IT department and forget about it. But

Learn More

ssae 18 data center

What Does Your Data Center Need to Be SSAE 18 Certified?

Now that SSAE 16 has been upgraded to SSAE 18, it’s important to understand exactly what the SSAE 18 requirements are for your data center. An SSAE 18 certification can boost your reputation, increase trust with your vendors, and improve performance within your own company. But in order to reap those benefits, you need to

Learn More


What You Need to Know About DFARS

Are you a Department of Defense contractor? Have you heard of DFARS? If you work with Controlled Unclassified Information, or CUI, you probably have. If you do work with CUI and you haven’t heard of DFARS — listen up. This information is important, and it impacts what you’ll need for high-compliance IT support.   All

Learn More

DFARS Compliance

The Consequences of DFARS Non-Compliance

DFARS compliance. As a contractor for the federal government, you’ve probably heard the phrase. For those who don’t know, DFARS stands for Defense Federal Acquisition Regulation Supplement. In August 2015, DFARS enacted NIST 800-171, a regulation designed to protect controlled unclassified information (CUI) from being hacked while in the hands of government contractors.   The

Learn More

10 Best Practices for Password Management

In 2016, Verizon announced that 63% of data breaches were the result of weak or stolen passwords. 93% of these breaches occurred in just minutes. Obviously, appropriate password management is key to secure company data. And it’s important to stay informed; some practices that are considered best practices, such as forcing employees to change passwords

Learn More

cybersecurity key internet statistics

2018 Mid-Year Report: Cybersecurity Stats

Cybersecurity stats show 2017 as another “worst year ever” for cyberattacks. There were several large breaches in personal data, including Equifax’s security breach that exposed nearly 145 million people. According to the Online Trust Alliance, there was even a 90% rise in business targeted ransomware. But how has 2018 compared so far? Cybersecurity stats for

Learn More

How to Set an IT Budget

Budgets are difficult things. At their hearts, budgets are about allocating resources – determining what expenditures will provide the most value, and then planning to make them. That can be complex in its own right, but for businesses juggling the demands of growth and the politics of different departments, allocating budgets can be even more

Learn More

5 Trends for IT Services in Frederick, Maryland

Today’s business world is constantly changing, and that impacts the local business environment in Frederick. The context: Frederick, Maryland is a small-to-medium sized city with a lot of small-to-medium sized businesses. Frederick is also starting to see growth in its STEM industries with companies such as Thermo-Fisher Scientific and Yakabod. This growth brings an increasing

Learn More

Lessons Learned from the Atlanta Government Hack

A cyberattack on your business is something you don’t realize the devastating effects of until it actually happens. Having a proactive plan in place is the most important step when dealing with a cyberattack attack, as there’s little you can do after the fact to recover from lost time, money and data. It didn’t take

Learn More

1-10 of 165