The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Multi-Factor Authentication Solutions: Your Key to Cyber Insurance

Multi-Factor Authentication Solutions: Your Key to Cyber Insurance

May, 2023 | Charles IT

Are you having issues securing cyber insurance? If you’re like most business owners, you understand the growing dependence on technology and the potential risks that tag along.

Change Your Approach to CMMC 2.0 Compliance to Be Successful

Change Your Approach to CMMC 2.0 Compliance to Be Successful

March, 2023 | Charles IT

Key takeaways that DoD contractors need to understand about the change to CMMC 2.0.

What is External Vulnerability Scanning?

What is External Vulnerability Scanning?

February, 2023 | Charles IT

Is the sensitive information of your business properly protected? Cyber attacks present an increasing risk for organizations, with recent data showing that 2021 was plagued with 50% more cyber [...]

What Can You Do to Stay Ahead of Changing Financial Cybersecurity Regulations?

What Can You Do to Stay Ahead of Changing Financial Cybersecurity Regulations?

August, 2022 | Charles IT

Cybersecurity is of the utmost importance for the finance sector. According to VMware’s “Modern Bank Heists Report”, in the first half of 2022, 63% of surveyed financial firms reported experiencing [...]

Time to Migrate? 5 Signs Your Business Needs a Virtual Private Cloud

Time to Migrate? 5 Signs Your Business Needs a Virtual Private Cloud

November, 2021 | Charles IT

As the argument in favor of cloud computing continues to strengthen in the era of remote work, the debate around private cloud security and public cloud security rages on. Few businesses have the [...]

Private Cloud vs Public Cloud: What You Don't Know Can Hurt You

Private Cloud vs Public Cloud: What You Don't Know Can Hurt You

November, 2021 | Charles IT

Recent years have seen cloud computing diversify into several deployment models suited to different workloads and business needs. The general classifications fall either into the category of public [...]

3 Things You Need to Get Right to Achieve CMMC Level 3 Certification

3 Things You Need to Get Right to Achieve CMMC Level 3 Certification

July, 2021 | Charles IT

While CMMC levels one and two encompass the transitional work required to get your cyber hygiene up to scratch, the third level is the one that most organizations will be aiming for. This level is [...]

DFARS 252.204-7012: Are the physical safeguards protecting your IT systems enough?

DFARS 252.204-7012: Are the physical safeguards protecting your IT systems enough?

June, 2021 | Charles IT

In the days of widespread virtualization and cloud computing, it might seem physical security is no longer as relevant as it once was. However, this is simply not the case. All data has to live [...]

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

May, 2021 | Charles IT

Unscheduled downtime costs businesses millions of dollars every year, but lost productivity is not the only threat. Maintaining the integrity of any information-bearing system is also essential for [...]

DFARS 252.204-7012: Key Identification and Authentication Protocols

DFARS 252.204-7012: Key Identification and Authentication Protocols

May, 2021 | Charles IT

Identification and authentication is one of the central pillars of any cybersecurity strategy, and it is essential to achieving compliance with the DFARS 252.204-7012 clause. Based on NIST SP 800 [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”