The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

How External Vulnerability Scanning Can Help with SOC 2 Data Security

How External Vulnerability Scanning Can Help with SOC 2 Data Security

September, 2022 | Mike Bailie

The System and Organization Controls (SOC) compliance framework sets the standards of a secure information architecture. By design, the framework leaves a high degree of flexibility to allow [...]

3 Things You Need to Get Right to Achieve CMMC Level 3 Certification

3 Things You Need to Get Right to Achieve CMMC Level 3 Certification

July, 2021 | Mike Bailie

While CMMC levels one and two encompass the transitional work required to get your cyber hygiene up to scratch, the third level is the one that most organizations will be aiming for. This level is [...]

DFARS 252.204-7012: Are the physical safeguards protecting your IT systems enough?

DFARS 252.204-7012: Are the physical safeguards protecting your IT systems enough?

June, 2021 | Mike Bailie

In the days of widespread virtualization and cloud computing, it might seem physical security is no longer as relevant as it once was. However, this is simply not the case. All data has to live [...]

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

May, 2021 | Mike Bailie

Unscheduled downtime costs businesses millions of dollars every year, but lost productivity is not the only threat. Maintaining the integrity of any information-bearing system is also essential for [...]

DFARS 252.204-7012: Key Identification and Authentication Protocols

DFARS 252.204-7012: Key Identification and Authentication Protocols

May, 2021 | Mike Bailie

Identification and authentication is one of the central pillars of any cybersecurity strategy, and it is essential to achieving compliance with the DFARS 252.204-7012 clause. Based on NIST SP 800 [...]

DFARS 252.204-7012: Are you equipped for configuration management?

DFARS 252.204-7012: Are you equipped for configuration management?

May, 2021 | Mike Bailie

Configuration management is one of the 14 control families covered under the NIST SP 800 171 cybersecurity framework. Adherence to the globally recognized standard is an essential part of achieving [...]

How to prepare for a HIPAA certification for IT professionals

How to prepare for a HIPAA certification for IT professionals

April, 2021 | Mike Bailie

Healthcare information technology systems are a favorite target for cybercriminals. Protected health information (PHI) contains a wealth of valuable data that can sell for a lot of money on the dark [...]

Dark Web Monitoring For SOC 2 Security: How Your Company Can Benefit

Dark Web Monitoring For SOC 2 Security: How Your Company Can Benefit

January, 2021 | Mike Bailie

Businesses around the globe are being hit by data breaches every day, but did you ever think about what cybercriminals do with the information they steal in these attacks? More often than not, the [...]

Why Cybersecurity Awareness Training is Vital to Passing a SOC 2 Audit

Why Cybersecurity Awareness Training is Vital to Passing a SOC 2 Audit

January, 2021 | Mike Bailie

For far too long has cybersecurity been viewed by the average employee as a technical issue and therefore something for the IT department to take care of. In reality, everyone has a role to play when [...]

Why Managed Detection is Helpful for SOC 2 Type 2 Compliance

Why Managed Detection is Helpful for SOC 2 Type 2 Compliance

January, 2021 | Mike Bailie

SOC 2 stands for service organization controls version 2, which was introduced to document and validate a business’s efforts to secure client data.

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”