The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

How Can a vCISO Help With Compliance?

How Can a vCISO Help With Compliance?

April, 2022 | Foster Charles

A chief information security officer (CISO) is a senior-level executive who’s in charge of securing a company’s digital assets. They lead in developing and implementing measures to protect the [...]

The Advantages of Hiring a vCISO: Why You Need a Dedicated Security Resource

The Advantages of Hiring a vCISO: Why You Need a Dedicated Security Resource

April, 2022 | Foster Charles

A virtual Chief Information Security Officer, or vCISO, can be a huge help to companies that are looking to improve their cybersecurity posture. By providing specific, tailored guidance and [...]

Security Solutions That Will Keep You from Getting Fined

Security Solutions That Will Keep You from Getting Fined

March, 2022 | Foster Charles

The cybersecurity landscape is rapidly evolving, and it can be difficult for businesses to keep up with the latest threats. If you don't have the right cybersecurity solutions in place, your business [...]

How Following NIST CSF Qualifies You for Safe Harbor Protection

How Following NIST CSF Qualifies You for Safe Harbor Protection

March, 2022 | Foster Charles

Getting hit by a cyberattack can be devastating for any business. Not only can it cost in terms of damages and recovery, but you can be sued if the attack leads to a data breach and loss of sensitive [...]

How Can Your Business Qualify Under the Safe Harbor Law?

How Can Your Business Qualify Under the Safe Harbor Law?

March, 2022 | Foster Charles

Several states across the United States, including Connecticut, recently passed the Cybersecurity Safe Harbor Law. This landmark legislation is important for both businesses and consumers because it [...]

Which Cybersecurity Frameworks Qualify for Safe Harbor?

Which Cybersecurity Frameworks Qualify for Safe Harbor?

March, 2022 | Foster Charles

The Health Insurance Portability and Accountability Act (HIPAA) enabled the development and implementation of standards for storing and handling protected health information (PHI). All covered [...]

What Is Connecticut’s Safe Harbor Law?

What Is Connecticut’s Safe Harbor Law?

March, 2022 | Foster Charles

The pandemic has proven to be a major challenge for businesses of all sizes, not only in terms of operations but also data security. With the rise in online communications and remote work, there has [...]

Why Security Awareness Training Is Essential for CMMC Compliance

Why Security Awareness Training Is Essential for CMMC Compliance

February, 2022 | Foster Charles

The US Department of Defense (DoD) works with over 100,000 companies and their subcontractors that are part of the Defense Industrial Base (DIB) sector. This sector “enables research and development, [...]

How Dark Web Monitoring Can Help Achieve CMMC 2.0 Compliance

How Dark Web Monitoring Can Help Achieve CMMC 2.0 Compliance

February, 2022 | Foster Charles

On November 4, 2021, the US Department of Defense (DoD) announced a massive revamp of the Cybersecurity Maturity Model Certification (CMMC 1.0) program. The new framework, dubbed CMMC 2.0, aims to [...]

How Encryption Can Help Keep Your Organization Compliant

How Encryption Can Help Keep Your Organization Compliant

February, 2022 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) guides organizations in building and strengthening their cybersecurity posture into manageable chunks. Apart from specifying controls that every [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”