The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

How Much Do You Know About Data Backup and Disaster Recovery?

How Much Do You Know About Data Backup and Disaster Recovery?

March, 2023 | Foster Charles

Do you have regular data backups in place? How about a detailed disaster recovery plan? If not, you may be jeopardizing your business’s ability to operate if disruptions do occur.  

What is Endpoint Encryption and Why Do You Need It?

What is Endpoint Encryption and Why Do You Need It?

March, 2023 | Foster Charles

Do you have the proper endpoint encryption worked into your business? If you’ve never heard of this term and don’t have a dedicated security team, odds are your business is lacking when it comes to [...]

What is a HIPAA security risk assessment, and who needs one?

What is a HIPAA security risk assessment, and who needs one?

March, 2023 | Foster Charles

The healthcare sector is a favorite target for cybercriminals and state-sponsored hackers. Contrary to popular belief, things like stolen medical records are worth far more on the dark web than [...]

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

March, 2023 | Foster Charles

Any Department of Defense (DoD) contractor must comply with the security standards of the Defense Federal Acquisition Regulation Supplement (DFARS) before it can be given access to controlled [...]

4 Important Issues External Vulnerability Scanning Can Reveal

4 Important Issues External Vulnerability Scanning Can Reveal

March, 2023 | Foster Charles

Most data breaches are easily avoidable if you take a proactive approach to manage your IT environment. Unfortunately, many businesses have historically relied only on reactive measures, such as [...]

Know The Difference Between DFARS and CMMC

Know The Difference Between DFARS and CMMC

March, 2023 | Foster Charles

If you’re an existing US Department of Defense (DoD) contractor, then you’ve probably achieved Defense Federal Acquisition Regulation Supplement (DFARS) compliance by now. But did you know that CMMC [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

What Is DFARS and What Does it Mean to Be Compliant?

What Is DFARS and What Does it Mean to Be Compliant?

February, 2023 | Foster Charles

All companies who contract with the DoD or another federal agency are subject to an extensive set of regulations -- in this case, DFARS. Noncompliance carries severe punishment, and you run the risk [...]

The 5 Most Commonly Missed Requirements for Cyber Insurance

The 5 Most Commonly Missed Requirements for Cyber Insurance

February, 2023 | Foster Charles

If you’d asked a business owner ten or even twenty years ago if they had cyber insurance, they’d probably have given you a puzzled look. Cyber insurance wasn’t always available for business owners [...]

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”