Aaron Bandzes

Aaron is a graduate of Central Connecticut State University with a degree in Industrial Technology specializing in Networking. He always knew from an early age that he had an interest in computers and choosing IT as a major in college just seemed natural. Aaron also worked over 5 years in the hospitality industry making employee of the month and training other front desk employees. Aaron combines his skills from both industries, organization and multitasking, along with his extensive knowledge of the IT industry, to seamlessly delivery exceptional service to all customers at Charles IT. His goal is to problem solve with customers and to convey computer concepts to them in a way that makes them understand and feel comfortable with technology. When he is not in front of a computer screen, Aaron enjoys the outdoors, traveling, spending time with family and friends.

What Is a Private Cloud? 3 Things You May Not Have Heard

What Is a Private Cloud? 3 Things You May Not Have Heard

Despite the fact that cloud computing is still a relatively young technology, it feels like a long time ago when business leaders were making the decision of whether to move to the cloud or not. However, more recent years have seen the cloud diversify to include a huge range of options tailored to the needs of virtually every business and industry vertical.

NIST Cybersecurity Framework Case Study: Learn 5 Best Practices

NIST Cybersecurity Framework Case Study: Learn 5 Best Practices

The NIST Cybersecurity Framework provides a systematic methodology for managing risk in your organization across the entire incident lifecycle. Although the framework is not intended to replace an organization’s risk-management practices, it can help standardize your strategy by managing risk company-wide.

Benefits of NIST Cybersecurity Framework: Defend Against Ransomware

Benefits of NIST Cybersecurity Framework: Defend Against Ransomware

Many organizations are adopting cybersecurity based on the NIST cybersecurity framework, now a globally recognized standard for helping counter new and emerging cyber threats. More recently, the NIST published a new draft on protecting against ransomware, which serves to complement the CSF. The addition to the framework features the ransomware profile, which is intended to help organizations ...

Building a CMMC Compliance Checklist for Level 3 Certification

Building a CMMC Compliance Checklist for Level 3 Certification

Most organizations wanting to contract or subcontract with the Department of Defense should aim for CMMC level 3. This is the minimum required level for handling controlled unclassified information (CUI), and compliance will be fully enforced from October 2025.

How Can a Gap Assessment Prepare You for CMMC Compliance?

How Can a Gap Assessment Prepare You for CMMC Compliance?

It may be tempting to put off your journey towards CMMC compliance, given that the regulation is not due to be fully implemented until October 1, 2025, but this would be a mistake. Earning a CMMC certification is no trivial task, especially if you are aiming for higher compliance levels. Starting now will give you plenty of time to get your information security strategy and systems up to scratch.

A HIPAA compliance checklist for IT teams

A HIPAA compliance checklist for IT teams

As the digital transformation of healthcare continues to gain ground, adherence to the health insurance portability and accountability act (HIPAA) is more important than ever. The threats are real, and healthcare is a top target for attackers, so it’s never too soon to reevaluate your compliance posture.

Why a HIPAA Risk Analysis is Essential to Achieving Compliance

Why a HIPAA Risk Analysis is Essential to Achieving Compliance

Cyberattacks on healthcare organizations are nothing new. In fact, there has been a 45% increase in the number of cyberattacks on healthcare companies since November 2020. Since then, the weekly attacks rose from 430 in October to 626 per organization in November. This is why the Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires all entities handling protected health ...

HIPAA Privacy Rule: How Telehealth Is Affecting IT Regulations

HIPAA Privacy Rule: How Telehealth Is Affecting IT Regulations

Since the onset of COVID-19, healthcare providers have been dealing with the challenges of implementing protocols to protect their staff and patients from possible exposure to the virus. One particular problem that they had to overcome was how to do routine consultations and checkups — a dilemma that telehealth helped solve.