The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DFARS 252.204-7012: Why a Proactive Incident Response Plan Is Crucial

DFARS 252.204-7012: Why a Proactive Incident Response Plan Is Crucial

May, 2021 | Foster Charles

Organizations should not wait for a security incident to happen before developing an incident response (IR) plan. Some organizations, however, neglect to develop an IR plan due to plain old [...]

DFARS 252.204-7012: Key Identification and Authentication Protocols

DFARS 252.204-7012: Key Identification and Authentication Protocols

May, 2021 | Charles IT

Identification and authentication is one of the central pillars of any cybersecurity strategy, and it is essential to achieving compliance with the DFARS 252.204-7012 clause. Based on NIST SP 800 [...]

DFARS 252.204-7012: Are you equipped for configuration management?

DFARS 252.204-7012: Are you equipped for configuration management?

May, 2021 | Charles IT

Configuration management is one of the 14 control families covered under the NIST SP 800 171 cybersecurity framework. Adherence to the globally recognized standard is an essential part of achieving [...]

DFARS 252.204-7012: How do your accountability standards measure up?

DFARS 252.204-7012: How do your accountability standards measure up?

May, 2021 | Sal Marino

When a data breach occurs, one of the first things business leaders tend to think about is who or what to blame. This can be a difficult question to answer, in which case the blame will likely shift [...]

DFARS 252.204-7012: Could a lack of training be putting you at risk?

DFARS 252.204-7012: Could a lack of training be putting you at risk?

May, 2021 | Foster Charles

Most people still think of cybersecurity as a technical challenge and that only the IT department needs to worry about it. This widespread misconception is exactly the reason why employees are often [...]

DFARS 252.204-7012: How effective are your access controls?

DFARS 252.204-7012: How effective are your access controls?

May, 2021 | Foster Charles

Access control is one of the fourteen groups of information security requirements specified by the NIST 800-171 standard. The standard aims to set a baseline for controlling access to any sensitive [...]

What the new HIPAA compliance requirements mean for your business

What the new HIPAA compliance requirements mean for your business

April, 2021 | Sal Marino

Every organization within the healthcare sector, including their suppliers, is legally obliged to take every reasonable step to safeguard the confidentiality, security, and integrity of protected [...]

A Guide to New and Proposed HIPAA Regulations: What to Expect

A Guide to New and Proposed HIPAA Regulations: What to Expect

April, 2021 | Foster Charles

It's been several years since the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was last updated, with the most recent changes being those pertaining to the Omnibus Rule in [...]

A HIPAA compliance checklist for IT teams

A HIPAA compliance checklist for IT teams

April, 2021 | Aaron Bandzes

As the digital transformation of healthcare continues to gain ground, adherence to the health insurance portability and accountability act (HIPAA) is more important than ever. The threats are real, [...]

5 ways to evaluate HIPAA-compliant storage services

5 ways to evaluate HIPAA-compliant storage services

April, 2021 | Sal Marino

The health insurance portability and accountability act (HIPAA) was introduced in 1996, when the information technology landscape looked very different to how it does today. As such, it is often [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”