The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Which Cybersecurity Frameworks Qualify for Safe Harbor?

Which Cybersecurity Frameworks Qualify for Safe Harbor?

March, 2022 | Foster Charles

The Health Insurance Portability and Accountability Act (HIPAA) enabled the development and implementation of standards for storing and handling protected health information (PHI). All covered [...]

What Is Connecticut’s Safe Harbor Law?

What Is Connecticut’s Safe Harbor Law?

March, 2022 | Foster Charles

The pandemic has proven to be a major challenge for businesses of all sizes, not only in terms of operations but also data security. With the rise in online communications and remote work, there has [...]

Why Security Awareness Training Is Essential for CMMC Compliance

Why Security Awareness Training Is Essential for CMMC Compliance

February, 2022 | Foster Charles

The US Department of Defense (DoD) works with over 100,000 companies and their subcontractors that are part of the Defense Industrial Base (DIB) sector. This sector “enables research and development, [...]

How Dark Web Monitoring Can Help Achieve CMMC 2.0 Compliance

How Dark Web Monitoring Can Help Achieve CMMC 2.0 Compliance

February, 2022 | Foster Charles

On November 4, 2021, the US Department of Defense (DoD) announced a massive revamp of the Cybersecurity Maturity Model Certification (CMMC 1.0) program. The new framework, dubbed CMMC 2.0, aims to [...]

How Encryption Can Help Keep Your Organization Compliant

How Encryption Can Help Keep Your Organization Compliant

February, 2022 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) guides organizations in building and strengthening their cybersecurity posture into manageable chunks. Apart from specifying controls that every [...]

Backup & Disaster Recovery's role in the CMMC framework

Backup & Disaster Recovery's role in the CMMC framework

February, 2022 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) framework is the basis for Department of Defense (DoD) efforts to safeguard controlled unclassified information (CUI) across its vast worldwide [...]

What Security Services Are Necessary to Be Compliant with CMMC 2.0?

What Security Services Are Necessary to Be Compliant with CMMC 2.0?

February, 2022 | Foster Charles

On November 4, 2021, the Department of Defense (DoD) announced a massive overhaul of the Cybersecurity Maturity Model Certification (CMMC 1.0) program. The new framework, dubbed CMMC 2.0, is still [...]

CMMC 2.0: Understanding the New Framework

CMMC 2.0: Understanding the New Framework

January, 2022 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity assessment program developed by the US Department of Defense (DoD). It is aimed at measuring the maturity of a defense [...]

Your Top 5 CMMC 2.0 Questions Answered

Your Top 5 CMMC 2.0 Questions Answered

January, 2022 | Foster Charles

The Department of Defense’s (DoD) announcement of revamping their Cybersecurity Maturity Model Certification (CMMC) program has left many contractors trying to understand how the update will affect [...]

What Companies Should Know About the DoD’s CMMC Update

What Companies Should Know About the DoD’s CMMC Update

January, 2022 | Foster Charles

On November 4, 2021, the Department of Defense (DoD) announced several changes to the Cybersecurity Maturity Model Certification (CMMC) program, now referred to as CMMC 1.0. CMMC 2.0, the updated [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”