The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

March, 2023 | Foster Charles

Any Department of Defense (DoD) contractor must comply with the security standards of the Defense Federal Acquisition Regulation Supplement (DFARS) before it can be given access to controlled [...]

4 Important Issues External Vulnerability Scanning Can Reveal

4 Important Issues External Vulnerability Scanning Can Reveal

March, 2023 | Foster Charles

Most data breaches are easily avoidable if you take a proactive approach to manage your IT environment. Unfortunately, many businesses have historically relied only on reactive measures, such as [...]

DFARS vs CMMC: What's the Difference?

DFARS vs CMMC: What's the Difference?

March, 2023 | Foster Charles

If you’re an existing US Department of Defense (DoD) contractor, then you’ve probably achieved Defense Federal Acquisition Regulation Supplement (DFARS) compliance by now. But did you know that CMMC [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

What Is DFARS and What Does it Mean to Be Compliant?

What Is DFARS and What Does it Mean to Be Compliant?

February, 2023 | Foster Charles

If your company has contracts with the Department of Defense or any other federal agency, you'll need to pay close attention to DFARS regulations. These rules are crucial for ensuring compliance and [...]

The 5 Most Commonly Missed Requirements for Cyber Insurance

The 5 Most Commonly Missed Requirements for Cyber Insurance

February, 2023 | Foster Charles

If you’d asked a business owner ten or even twenty years ago if they had cyber insurance, they’d probably have given you a puzzled look. Cyber insurance wasn’t always available for business owners [...]

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Which CMMC 2.0 Level Is Right for Your Company?

Which CMMC 2.0 Level Is Right for Your Company?

January, 2023 | Foster Charles

In January 2020, the US Department of Defense (DoD) launched the first version of the Cybersecurity Maturity Model Certification (CMMC 1.0) framework. This framework was created to ensure that [...]

5 Things You Need to Know About CMMC and How it Builds on DFARS

5 Things You Need to Know About CMMC and How it Builds on DFARS

January, 2023 | Foster Charles

Cybercriminals have targeted and continue to target the Defense Industrial Base (DIB) sector, as well as the Department of Defense's (DoD) supply chain in the hopes of stealing vital intellectual [...]

What is Multi-Factor Authentication?

What is Multi-Factor Authentication?

January, 2023 | Foster Charles

When you log in to one of your online accounts, you are going through a process called authentication. Traditional authentication involves a username and password; however, many users pick simple [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”