The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DFARS vs CMMC: What's the Difference?

DFARS vs CMMC: What's the Difference?

March, 2023 | Foster Charles

If you’re an existing US Department of Defense (DoD) contractor, then you’ve probably achieved Defense Federal Acquisition Regulation Supplement (DFARS) compliance by now. But did you know that CMMC [...]

Why Use Multi-Factor Authentication: 5 Top Reasons

Why Use Multi-Factor Authentication: 5 Top Reasons

March, 2023 | Jack Ardrey

With cyber attacks increasing at a rapid rate, the importance of securing your organization at every level is crucial. What's one of the best ways to secure your network? You guessed it - [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

Charles IT Selected As A 2023 Great Employer in Connecticut

Charles IT Selected As A 2023 Great Employer in Connecticut

February, 2023 | Jack Ardrey

Middletown, Connecticut (02/22/2023) – Charles IT has been recognized as a 2023 Great Employer in Connecticut. The award, organized by Best Companies Group, is data-driven and looks at company [...]

What Is DFARS and What Does it Mean to Be Compliant?

What Is DFARS and What Does it Mean to Be Compliant?

February, 2023 | Foster Charles

If your company has contracts with the Department of Defense or any other federal agency, you'll need to pay close attention to DFARS regulations. These rules are crucial for ensuring compliance and [...]

What is External Vulnerability Scanning?

What is External Vulnerability Scanning?

February, 2023 | Charles IT

Is the sensitive information of your business properly protected? Cyber attacks present an increasing risk for organizations, with recent data showing that 2021 was plagued with 50% more cyber [...]

The 5 Most Commonly Missed Requirements for Cyber Insurance

The 5 Most Commonly Missed Requirements for Cyber Insurance

February, 2023 | Foster Charles

If you’d asked a business owner ten or even twenty years ago if they had cyber insurance, they’d probably have given you a puzzled look. Cyber insurance wasn’t always available for business owners [...]

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Change How You Approach Backup and Disaster Recovery to Be Prepared for Any Scenario

Change How You Approach Backup and Disaster Recovery to Be Prepared for Any Scenario

January, 2023 | Foster Charles

Imagine this situation: Due to technical issues beyond your control, your entire company server essentially falls off the face of the earth. What do you need to do immediately? What hardware should [...]

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

January, 2023 | Sal Marino

The SEC is ramping up cybersecurity compliance efforts, recently issuing First American Financial Corporation over $487,000 in fines for poor vulnerability management that put their investors’ [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”