The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

What is External Vulnerability Scanning?

What is External Vulnerability Scanning?

February, 2023 | Charles IT

Is the sensitive information of your business properly protected? Cyber attacks present an increasing risk for organizations, with recent data showing that 2021 was plagued with 50% more cyber [...]

What Can You Do to Stay Ahead of Changing Financial Cybersecurity Regulations?

What Can You Do to Stay Ahead of Changing Financial Cybersecurity Regulations?

August, 2022 | Charles IT

Cybersecurity is of the utmost importance for the finance sector. According to VMware’s “Modern Bank Heists Report”, in the first half of 2022, 63% of surveyed financial firms reported experiencing [...]

Time to Migrate? 5 Signs Your Business Needs a Virtual Private Cloud

Time to Migrate? 5 Signs Your Business Needs a Virtual Private Cloud

November, 2021 | Charles IT

As the argument in favor of cloud computing continues to strengthen in the era of remote work, the debate around private cloud security and public cloud security rages on. Few businesses have the [...]

Private Cloud vs Public Cloud: What You Don't Know Can Hurt You

Private Cloud vs Public Cloud: What You Don't Know Can Hurt You

November, 2021 | Charles IT

Recent years have seen cloud computing diversify into several deployment models suited to different workloads and business needs. The general classifications fall either into the category of public [...]

3 Things You Need to Get Right to Achieve CMMC Level 3 Certification

3 Things You Need to Get Right to Achieve CMMC Level 3 Certification

July, 2021 | Charles IT

While CMMC levels one and two encompass the transitional work required to get your cyber hygiene up to scratch, the third level is the one that most organizations will be aiming for. This level is [...]

DFARS 252.204-7012: Are Your IT System Safeguards Enough?

DFARS 252.204-7012: Are Your IT System Safeguards Enough?

June, 2021 | Charles IT

In the days of widespread virtualization and cloud computing, it might seem physical security is no longer as relevant as it once was. However, this is simply not the case. All data has to live [...]

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

May, 2021 | Charles IT

Unscheduled downtime costs businesses millions of dollars every year, but lost productivity is not the only threat. Maintaining the integrity of any information-bearing system is also essential for [...]

DFARS 252.204-7012: Key Identification and Authentication Protocols

DFARS 252.204-7012: Key Identification and Authentication Protocols

May, 2021 | Charles IT

Identification and authentication is one of the central pillars of any cybersecurity strategy, and it is essential to achieving compliance with the DFARS 252.204-7012 clause. Based on NIST SP 800 [...]

DFARS 252.204-7012: Are you equipped for configuration management?

DFARS 252.204-7012: Are you equipped for configuration management?

May, 2021 | Charles IT

Configuration management is one of the 14 control families covered under the NIST SP 800 171 cybersecurity framework. Adherence to the globally recognized standard is an essential part of achieving [...]

Why Is Vulnerability Testing Crucial to Preparing for a SOC 2 Audit?

Why Is Vulnerability Testing Crucial to Preparing for a SOC 2 Audit?

February, 2021 | Charles IT

Cloud computing and Software-as-a-Service providers play a big role in their clients' data security. When providers mishandle data, organizations can be left vulnerable to cyberattacks like malware [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”