The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DoD CMMC FAQs: Questions Answered

DoD CMMC FAQs: Questions Answered

September, 2020 | Foster Charles

To protect controlled unclassified information (CUI) that the US Department of Defense (DoD) handles, the department initially required its contractors to comply with the cybersecurity requirements [...]

Why Managed Detection and Response is Important for CMMC Version 1.0

Why Managed Detection and Response is Important for CMMC Version 1.0

September, 2020 | Foster Charles

Change is the only constant in the world of cybersecurity. The threat landscape continues to evolve as hackers and scammers grow bolder and more consistent as they find ways to obtain confidential [...]

Do You Need GCC High to Be CMMC 2.0 DoD Compliant?

Do You Need GCC High to Be CMMC 2.0 DoD Compliant?

September, 2020 | Foster Charles

Contractors and subcontractors working for the US Department of Defense (DoD) are required to comply with security regulations such as the Defense Federal Acquisition Regulation Supplement (DFARS) [...]

Four Steps to Becoming CMMC 2.0 Certified

Four Steps to Becoming CMMC 2.0 Certified

August, 2020 | Foster Charles

If you are a contractor for the US Department of Defense (DoD), you’ve probably already prepared for Cybersecurity Maturity Model Certification (CMMC). The CMMC 2.0 is a program that measures [...]

A Guide to CMMC 1.0: What Companies Should Know

A Guide to CMMC 1.0: What Companies Should Know

August, 2020 | Foster Charles

On 31 January 2020, the Department of Defense (DoD) launched the first finalized version of the Cybersecurity Maturity Model Certification (CMMC). The CMMC version 1.0 is a new set of regulations [...]

CMMC 2.0 vs. NIST 800-171: Important Differences

CMMC 2.0 vs. NIST 800-171: Important Differences

August, 2020 | Foster Charles

The US Department of Defense (DoD) supply chain is a prime target for cybercriminals and hostile nations looking to steal and expose sensitive government information. These threats led to the [...]

CMMC vs FedRAMP: Steps to Achieving FedRAMP Compliance

CMMC vs FedRAMP: Steps to Achieving FedRAMP Compliance

August, 2020 | Foster Charles

Cloud-based computing has streamlined data processing, storage, and security, which is why federal agencies are encouraged to move their data and workflows to the cloud. Any cloud service provider [...]

Tips to Prepare for a CMMC 2.0 Audit

Tips to Prepare for a CMMC 2.0 Audit

August, 2020 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity framework created by the Office of the Under Secretary of Defense for Acquisition and Sustainment or OUSD(A&S). This new [...]

What is the Cybersecurity Maturity Model Certification (CMMC)

What is the Cybersecurity Maturity Model Certification (CMMC)

August, 2020 | Foster Charles

If you’re on this blog post, it’s likely you’re looking for resources related to the new Cybersecurity Maturity Model Certification (CMMC) which has been in full effect for all DoD contractors and [...]

A Quick Guide to the 3 CMMC 2.0 Levels

A Quick Guide to the 3 CMMC 2.0 Levels

August, 2020 | Foster Charles

In our previous blog, we discussed that one of the key differences between Defense Federal Acquisition Regulation Supplement (DFARS) and Cybersecurity Maturity Model Certification (CMMC) is the [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”