The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Change How You Approach Backup and Disaster Recovery to Be Prepared for Any Scenario

Change How You Approach Backup and Disaster Recovery to Be Prepared for Any Scenario

January, 2023 | Foster Charles

Imagine this situation: Due to technical issues beyond your control, your entire company server essentially falls off the face of the earth. What do you need to do immediately? What hardware should [...]

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

January, 2023 | Sal Marino

The SEC is ramping up cybersecurity compliance efforts, recently issuing First American Financial Corporation over $487,000 in fines for poor vulnerability management that put their investors’ [...]

Which CMMC 2.0 Level Is Right for Your Company?

Which CMMC 2.0 Level Is Right for Your Company?

January, 2023 | Foster Charles

In January 2020, the US Department of Defense (DoD) launched the first version of the Cybersecurity Maturity Model Certification (CMMC 1.0) framework. This framework was created to ensure that [...]

New England Manufacturer Uncovers IT Security Gaps

New England Manufacturer Uncovers IT Security Gaps

January, 2023 | Betta Greenberg

Situation Older IT Systems and Security Practices Needed a Review As a full-service supplier of cutting-edge automation and process control systems based in Connecticut, Pearse Bertrum needed to make [...]

5 Things You Need to Know About CMMC and How it Builds on DFARS

5 Things You Need to Know About CMMC and How it Builds on DFARS

January, 2023 | Foster Charles

Cybercriminals have targeted and continue to target the Defense Industrial Base (DIB) sector, as well as the Department of Defense's (DoD) supply chain in the hopes of stealing vital intellectual [...]

What is Multi-Factor Authentication?

What is Multi-Factor Authentication?

January, 2023 | Foster Charles

When you log in to one of your online accounts, you are going through a process called authentication. Traditional authentication involves a username and password; however, many users pick simple [...]

CMMC Cybersecurity Maturity Model Certification Explained

CMMC Cybersecurity Maturity Model Certification Explained

January, 2023 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) is a set of guidelines for implementing cybersecurity measures across Department of Defense (DoD) contractors. CMMC was designed as a supplement [...]

Maximizing Cost Efficiency: Comparing In-House vs. Outsourced IT Support for Your Business

Maximizing Cost Efficiency: Comparing In-House vs. Outsourced IT Support for Your Business

December, 2022 | Sal Marino

Making the decision to establish an in-house IT department or to outsource to a managed IT services provider (MSP) can be hard. Both options have pros and cons, and it’s important to weigh these [...]

CHARLES IT NAMED A 2022 BEST & BRIGHTEST COMPANY TO WORK FOR IN THE NATION

CHARLES IT NAMED A 2022 BEST & BRIGHTEST COMPANY TO WORK FOR IN THE NATION

December, 2022 | Jack Ardrey

FOR IMMEDIATE RELEASE 12.27.2022 Middletown, Connecticut (12/20/2022) – Charles IT has been named a winner in the 2022 Best & Brightest Companies to Work for in the Nation awards program, [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”