The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DFARS 252.204-7012: Key Identification and Authentication Protocols

DFARS 252.204-7012: Key Identification and Authentication Protocols

May, 2021 | Charles IT

Identification and authentication is one of the central pillars of any cybersecurity strategy, and it is essential to achieving compliance with the DFARS 252.204-7012 clause. Based on NIST SP 800 [...]

DFARS 252.204-7012: Are you equipped for configuration management?

DFARS 252.204-7012: Are you equipped for configuration management?

May, 2021 | Charles IT

Configuration management is one of the 14 control families covered under the NIST SP 800 171 cybersecurity framework. Adherence to the globally recognized standard is an essential part of achieving [...]

Why Is Vulnerability Testing Crucial to Preparing for a SOC 2 Audit?

Why Is Vulnerability Testing Crucial to Preparing for a SOC 2 Audit?

February, 2021 | Charles IT

Cloud computing and Software-as-a-Service providers play a big role in their clients' data security. When providers mishandle data, organizations can be left vulnerable to cyberattacks like malware [...]

5 Ways an MSP Can Walk You Through Your SOC 2 Audit Process

5 Ways an MSP Can Walk You Through Your SOC 2 Audit Process

February, 2021 | Charles IT

Any organization that provides online services, such as cloud hosting or payment processing, must do everything in its power to ensure client data is kept secure and private. In addition to being a [...]

Dark Web Monitoring For SOC 2 Security: How Your Company Can Benefit

Dark Web Monitoring For SOC 2 Security: How Your Company Can Benefit

January, 2021 | Charles IT

Businesses around the globe are being hit by data breaches every day, but did you ever think about what cybercriminals do with the information they steal in these attacks? More often than not, the [...]

Why Cybersecurity Awareness Training is Vital to Passing a SOC 2 Audit

Why Cybersecurity Awareness Training is Vital to Passing a SOC 2 Audit

January, 2021 | Charles IT

For far too long has cybersecurity been viewed by most as a technical issue and something for the "IT guy" to take care of. In reality, everyone has a role to play when it comes to safeguarding [...]

How Your Business Can Achieve SOC 2 Certification

How Your Business Can Achieve SOC 2 Certification

January, 2021 | Charles IT

Organizations that do a lot of business online transmit a large amount of sensitive data every day. Cybersecurity breaches can happen anytime, so it's vital for businesses to take extra measures to [...]

Why Managed Detection is Helpful for SOC 2 Type 2 Compliance

Why Managed Detection is Helpful for SOC 2 Type 2 Compliance

January, 2021 | Charles IT

SOC 2 stands for service organization controls version 2, which was introduced to document and validate a business’s efforts to secure client data.

SOC 2 Explained: SOC 2 Type 1 Vs. Type 2 Compliance

SOC 2 Explained: SOC 2 Type 1 Vs. Type 2 Compliance

January, 2021 | Charles IT

If you’re a service provider that stores or transmits personally identifiable customer data, then there’s a good chance you’ve already been asked about SOC 2 compliance. Compliance has become a [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”