The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Why Monitoring Is Key to System Integrity

Why Monitoring Is Key to System Integrity

June, 2021 | Foster Charles

Working as a contractor for the DoD requires compliance with the DFARS 252.204-7012 rules, which are based on the globally recognized NIST 800-171 guidelines. Meeting these rules is not a one-time [...]

How Strong Are the Boundaries of Your Systems?

How Strong Are the Boundaries of Your Systems?

June, 2021 | Foster Charles

DFARS 252.204-7012 Security Requirement 3.12.4 requires contractors of the Department of Defense to create and regularly update a system security plan. This plan should describe the boundaries of [...]

How A DFARS Gap Assessment Helps You Evaluate Security

How A DFARS Gap Assessment Helps You Evaluate Security

June, 2021 | Foster Charles

Keeping up with the demands of compliance is a constant challenge, especially for companies operating in a highly regulated sector like the Defense Industrial Base. DFARS 252.204-7012 compliance, [...]

DFARS 252.204-7012: Are the Safeguards for Your IT Systems Enough?

DFARS 252.204-7012: Are the Safeguards for Your IT Systems Enough?

June, 2021 | Foster Charles

Every business faces a unique set of risks across a number of key domains. If your company stores, processes, or transmits controlled unclassified information (CUI) in the capacity of a defense [...]

DFARS 252.204-7012: Are the physical safeguards protecting your IT systems enough?

DFARS 252.204-7012: Are the physical safeguards protecting your IT systems enough?

June, 2021 | Charles IT

In the days of widespread virtualization and cloud computing, it might seem physical security is no longer as relevant as it once was. However, this is simply not the case. All data has to live [...]

DFARS Clause 252.204-7012: Is Your Personnel Security Up to Par?

DFARS Clause 252.204-7012: Is Your Personnel Security Up to Par?

May, 2021 | Foster Charles

There’s a wide range of cybersecurity tools that organizations can use to reduce the risks of data compromise. However, there’s an equally wide variety of cyberthreats, and staying ahead of these [...]

DFARS 252.204-7012: What are the best ways to protect media and CUI?

DFARS 252.204-7012: What are the best ways to protect media and CUI?

May, 2021 | Foster Charles

The DFARS 252.204-7012 clause sets high standards governing the protection, sanitization, and secure destruction of controlled unclassified information (CUI). Compliance is mandatory for any [...]

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

DFARS 252.204-7012: Tips for making sure your IT maintenance is up to standard

May, 2021 | Charles IT

Unscheduled downtime costs businesses millions of dollars every year, but lost productivity is not the only threat. Maintaining the integrity of any information-bearing system is also essential for [...]

DFARS 252.204-7012: Why a Proactive Incident Response Plan Is Crucial

DFARS 252.204-7012: Why a Proactive Incident Response Plan Is Crucial

May, 2021 | Foster Charles

Organizations should not wait for a security incident to happen before developing an incident response (IR) plan. Some organizations, however, neglect to develop an IR plan due to plain old [...]

DFARS 252.204-7012: Key Identification and Authentication Protocols

DFARS 252.204-7012: Key Identification and Authentication Protocols

May, 2021 | Charles IT

Identification and authentication is one of the central pillars of any cybersecurity strategy, and it is essential to achieving compliance with the DFARS 252.204-7012 clause. Based on NIST SP 800 [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”