Foster Charles

DFARS Cybersecurity: Requirements and Compliance

DFARS Cybersecurity: Requirements and Compliance

Businesses that work with the Department of Defense (DoD) understand that there are precise controls for systems that utilize classified data. What might not be as well known are the specs for DFARS (Defense Federal Acquisition Regulation Supplement) and the compliance that applies to unclassified information. 

DFARS Regulations and Their Impact On Your Business

DFARS Regulations and Their Impact On Your Business

Cyberattacks against the US military aren’t uncommon, but cyberattacks against military contractors worry defense officials the most. While defense contractors may be party to closely-guarded military secrets—such as designs for advanced weaponry, vehicles, and equipment—they may not be able to marshal the same level of  cyber defense.

A Guide to CMMC & DFARS Compliance Requirements

A Guide to CMMC & DFARS Compliance Requirements

The Defense Federal Acquisition Regulation Supplement (DFARS) is a set of cybersecurity rules, guidelines, and regulation codes used by the Department of Defense (DoD) to safeguard controlled unclassified information (CUI) obtained and transmitted by contractors and subcontractors. If your business provides products and services to the DoD, it must first comply with DFARS regulations.

The Cybersecurity Maturity Model Certification Starts with DFARS: The Four Steps to Success

The Cybersecurity Maturity Model Certification Starts with DFARS: The Four Steps to Success

Contractors for the US Department of Defense (DoD) are expected to be familiar with the Defense Federal Acquisition Regulation Supplement (DFARS) compliance requirements. If you’re a DoD contractor and want tips on how to achieve compliance, understand the difference between DFARS and Cybersecurity Maturity Model Certification (CMMC), or know the different types of self-assessment checklists for ...

The benefits of a hosted 3CX phone system

The benefits of a hosted 3CX phone system

If you're in a business of any sort, you've probably heard of the term VoIP. Also known as Voice over Internet Protocol, it's essentially a telephone service that runs on the internet. Of course, it has different variations and comes with a mix of old and new technology, but at its core, VoIP provides numerous advantages for businesses. Still, many are confused with how it works.

5 common IaaS migration mistakes and how to avoid them

5 common IaaS migration mistakes and how to avoid them

Most small business owners appreciate the value of the cloud, but that doesn’t mean they’re ready to make the move. As with any outsourced IT support strategy, careful planning and research is essential, especially since mistakes can end up costing you dearly.

The top 3 ways for Connecticut manufacturers to overcome technology obstacles

The top 3 ways for Connecticut manufacturers to overcome technology obstacles

From the factory floor to the shop window, Connecticut manufacturers are starting to recognize the advantages of cutting-edge technologies, such as Internet of Things (IoT) devices and automation driven software by machine learning. Businesses in our state have the luxury of easy access to tech talent, as its one of the best places in the nation to find IT expertise.

How to educate your employees so they don't accidentally leak information

How to educate your employees so they don't accidentally leak information

Dysfunctional technology is often the first thing that people blame when there’s a data breach, but studies have consistently shown that human error is behind the majority of cases. In fact, one of Connecticut’s biggest breaches was accomplished by a scammer pretending to be a school superintendent who was requesting teacher W-2s.

4 Strategies to improve patient care using electronic health records

4 Strategies to improve patient care using electronic health records

If you operate a healthcare practice, transitioning from paper to electronic medical records (EHRs) has almost certainly been your biggest IT challenge over the past few years. In 2015, Medicare began fining hospitals and doctors that don’t use EHR systems, which encouraged many organizations to view these solutions as requirements rather than opportunities. Viewed another way, EHR systems are ...

Proactive IT Support Is an Investment, Not an Expense

Proactive IT Support Is an Investment, Not an Expense

There are two ways to make sure your company’s IT network runs smoothly. You can either keep the task in-house by placing full-time administrators and technicians on your payroll, or you can outsource the task to an IT support firm. Which one’s better depends on your situation, but outsourcing may deliver benefits you hadn’t thought of.