You Need to Protect Your CUI Files in a Manufacturing Environment. Here’s Why.
The manufacturing industry houses endless types of companies, which inevitably means many types of data. In fact, the manufacturing industry is one of the most frequently hacked industries, second only to healthcare. In a world in which competitive advantage is everything, imagine losing out on sensitive customer information, or a design that you’ve spent millions […]
A Guide to Document Control With Multi Factor Authentication
Traditional security is built around keeping content and data within the walls of your network. Accessing this data required walking into an office and sticking your ID card in to gain entry (or the virtual equivalent). The COVID experience has opened our eyes to the fact that users are working with content and data in […]
A Guide To Legal Data Protection for HR Teams and C-Suites [Business Operations]
Among their many other responsibilities, the Human Resources department of any company is largely responsible for the protection of sensitive personal data. Human Resources data security has become a necessary part of any job description. Employee reviews, salary information, medical information, and internal complaints are just the beginning of the types of information that can […]
How to Protect Your CAD Files from Copyright and Intellectual Property Infringement
Copyright infringement is a serious threat to any intellectual property, including CAD data.
Understanding Doxware and Ransomware with Anchor’s Jake Cleveland
Datanchor’s General Manager Jake Cleveland joins the host of Strategic Communications video podcast, Tech This! to talk about doxware and ransomware.
Anchor: Crypto-Technology Cyber Security for CMMC and NIST SP 800-171 Compliance
COLUMBUS, Ohio, June 3, 2021 /PRNewswire/ — Cybersecurity Maturity Model Certification (CMMC) v1.02 is intended to be a verification mechanism to ensure suppliers to the Department of Defense utilize the appropriate levels of cybersecurity and processes when handling Controlled Unclassified Information (CUI).
Anchor: Crypto-Technology for Ransomware and Doxware Protection
COLUMBUS, Ohio, June 1, 2021 /PRNewswire/ — Ransomware is used to lock up data and make organizations pay a ransom to regain access. Ransomware has now evolved into something even more dangerous called Doxware.
Protecting Sensitive Data In Remote Work
Michael Zinn of Micro Systems Management (msmctech.com) talks to The Anchor about cybersecurity and protecting sensitive data in a remote work environment. Michael is a systems engineer & certified forensic examiner who has done extensive high-level network security work for both commercial and national defense.
The SolarWinds Hack – A Much Bigger Problem
The SolarWinds hack is a big deal not just because of hack itself, but because it represents an example of a much larger problem. A lack of robustness in today’s network and security architecture. Professor C. Emre Koksal explains why this is a systematic problem that will repeat itself if we don’t change the way we think about cybersecurity.
The CMMC 2020 Year End Scoop
Troy Fine, a certified CMMC registered practitioner and provisional assessor at Schneider Downs gives us the low down on where we are with the CMMC journey at the end of 2020 and how DIB contractors should get started.