The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

What is External Vulnerability Scanning?

What is External Vulnerability Scanning?

February, 2023 | Charles IT

Is the sensitive information of your business properly protected? Cyber attacks present an increasing risk for organizations, with recent data showing that 2021 was plagued with 50% more cyber [...]

The 5 Most Commonly Missed Requirements for Cyber Insurance

The 5 Most Commonly Missed Requirements for Cyber Insurance

February, 2023 | Foster Charles

If you’d asked a business owner ten or even twenty years ago if they had cyber insurance, they’d probably have given you a puzzled look. Cyber insurance wasn’t always available for business owners [...]

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Change How You Approach Backup and Disaster Recovery to Be Prepared for Any Scenario

Change How You Approach Backup and Disaster Recovery to Be Prepared for Any Scenario

January, 2023 | Foster Charles

Imagine this situation: Due to technical issues beyond your control, your entire company server essentially falls off the face of the earth. What do you need to do immediately? What hardware should [...]

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

January, 2023 | Sal Marino

The SEC is ramping up cybersecurity compliance efforts, recently issuing First American Financial Corporation over $487,000 in fines for poor vulnerability management that put their investors’ [...]

Which CMMC 2.0 Level Is Right for Your Company?

Which CMMC 2.0 Level Is Right for Your Company?

January, 2023 | Foster Charles

In January 2020, the US Department of Defense (DoD) launched the first version of the Cybersecurity Maturity Model Certification (CMMC 1.0) framework. This framework was created to ensure that [...]

New England Manufacturer Uncovers IT Security Gaps to Strengthen Their IT Posture and Realize Efficiency Gains

New England Manufacturer Uncovers IT Security Gaps to Strengthen Their IT Posture and Realize Efficiency Gains

January, 2023 | Betta Greenberg

Situation Older IT Systems and Security Practices Needed a Review As a full-service supplier of cutting-edge automation and process control systems based in Connecticut, Pearse Bertrum needed to make [...]

5 Things You Need to Know About CMMC and How it Builds on DFARS

5 Things You Need to Know About CMMC and How it Builds on DFARS

January, 2023 | Foster Charles

Cybercriminals have targeted and continue to target the Defense Industrial Base (DIB) sector, as well as the Department of Defense's (DoD) supply chain in the hopes of stealing vital intellectual [...]

What is Multi-Factor Authentication?

What is Multi-Factor Authentication?

January, 2023 | Foster Charles

When you log in to one of your online accounts, you are going through a process called authentication. Traditional authentication involves a username and password; however, many users pick simple [...]

CMMC Cybersecurity Maturity Model Certification Explained

CMMC Cybersecurity Maturity Model Certification Explained

January, 2023 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) is a set of guidelines for implementing cybersecurity measures across Department of Defense (DoD) contractors. CMMC was designed as a supplement [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”