The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

What is a HIPAA security risk assessment, and who needs one?

What is a HIPAA security risk assessment, and who needs one?

March, 2023 | Foster Charles

The healthcare sector is a favorite target for cybercriminals and state-sponsored hackers. Contrary to popular belief, things like stolen medical records are worth far more on the dark web than [...]

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

March, 2023 | Foster Charles

Any Department of Defense (DoD) contractor must comply with the security standards of the Defense Federal Acquisition Regulation Supplement (DFARS) before it can be given access to controlled [...]

4 Important Issues External Vulnerability Scanning Can Reveal

4 Important Issues External Vulnerability Scanning Can Reveal

March, 2023 | Foster Charles

Most data breaches are easily avoidable if you take a proactive approach to manage your IT environment. Unfortunately, many businesses have historically relied only on reactive measures, such as [...]

DFARS vs CMMC: What's the Difference?

DFARS vs CMMC: What's the Difference?

March, 2023 | Foster Charles

If you’re an existing US Department of Defense (DoD) contractor, then you’ve probably achieved Defense Federal Acquisition Regulation Supplement (DFARS) compliance by now. But did you know that CMMC [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

What Is DFARS and What Does it Mean to Be Compliant?

What Is DFARS and What Does it Mean to Be Compliant?

February, 2023 | Foster Charles

If your company has contracts with the Department of Defense or any other federal agency, you'll need to pay close attention to DFARS regulations. These rules are crucial for ensuring compliance and [...]

The 5 Most Commonly Missed Requirements for Cyber Insurance

The 5 Most Commonly Missed Requirements for Cyber Insurance

February, 2023 | Foster Charles

If you’d asked a business owner ten or even twenty years ago if they had cyber insurance, they’d probably have given you a puzzled look. Cyber insurance wasn’t always available for business owners [...]

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Which CMMC 2.0 Level Is Right for Your Company?

Which CMMC 2.0 Level Is Right for Your Company?

January, 2023 | Foster Charles

In January 2020, the US Department of Defense (DoD) launched the first version of the Cybersecurity Maturity Model Certification (CMMC 1.0) framework. This framework was created to ensure that [...]

5 Things You Need to Know About CMMC and How it Builds on DFARS

5 Things You Need to Know About CMMC and How it Builds on DFARS

January, 2023 | Foster Charles

Cybercriminals have targeted and continue to target the Defense Industrial Base (DIB) sector, as well as the Department of Defense's (DoD) supply chain in the hopes of stealing vital intellectual [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”