The Charles IT Blog

CMMC 2.0: What's In The New Version?

CMMC 2.0: What's In The New Version?

Last week, the U.S. Department of Defense came out with updates to CMMC the framework. The aim of the updates, labeled "CMMC 2.0", is to provide strategic direction following an internal program assessment by the Department leaders. The revision still maintains the compliance's goal of safeguarding sensitive information, while simplifying the standards it follows.

What Is a Private Cloud? 3 Things You May Not Have Heard

What Is a Private Cloud? 3 Things You May Not Have Heard

Despite the fact that cloud computing is still a relatively young technology, it feels like a long time ago when business leaders were making the decision of whether to move to the cloud or not. However, more recent years have seen the cloud diversify to include a huge range of options tailored to the needs of virtually every business and industry vertical.

How Can an MSP Help with NIST Compliance?

How Can an MSP Help with NIST Compliance?

With cyberattacks costing businesses and governments billions of dollars every year, it’s never been more important to adopt a proactive approach to information security.

Why You Need a NIST Cybersecurity Framework Maturity Assessment

Why You Need a NIST Cybersecurity Framework Maturity Assessment

One of the biggest challenges in building a sufficiently robust information security program is that there are so many guidelines and frameworks to choose from. Moreover, every business has a unique set of needs and a different technology infrastructure, which also means there’s no one-size-fits-all approach.

NIST Cybersecurity Framework Case Study: Learn 5 Best Practices

NIST Cybersecurity Framework Case Study: Learn 5 Best Practices

The NIST Cybersecurity Framework provides a systematic methodology for managing risk in your organization across the entire incident lifecycle. Although the framework is not intended to replace an organization’s risk-management practices, it can help standardize your strategy by managing risk company-wide.

How to Implement NIST Cybersecurity Framework

How to Implement NIST Cybersecurity Framework

Organizations can no longer afford to view cybersecurity as a necessary evil and a mere cost center. Instead, they should view it as an integral component of their value propositions now that customers are increasingly wary about who they do business with. In other words, good security is good for business, not just because it helps mitigate risk, but because it opens the door to lucrative new ...

Assessing Your NIST Framework Tier Level

Assessing Your NIST Framework Tier Level

There are three primary components of the globally adopted NIST Cybersecurity Framework: the framework core, the profiles, and implementation tiers. While the framework details the specific control categories you need to protect your data, the profiles enable you to create a strategy for reducing risk. Implementation tiers, on the other hand, establish a baseline for cybersecurity that you can ...

The NIST Framework Tiers Explained

The NIST Framework Tiers Explained

The NIST Cybersecurity Framework is a leading global standard in cybersecurity, as well as the basis of many legal regulations and other standards. There are three main elements to the framework – the framework core, profiles, and implementation tiers. These tiers are intended to provide context for stakeholders to help determine the degree to which their organizations exhibit the characteristics ...

NIST CSF Controls: A Handy Checklist

NIST CSF Controls: A Handy Checklist

One of the most common drawbacks of cybersecurity frameworks and standards is that they fail to make a sufficiently compelling case to business leaders. Many focus on the needs of IT teams and exhibit high technological complexity and technical challenges for implementation. Others are biased towards specific types of computing infrastructure or even specific vendors.

Mapping NIST CSF Controls: How to Get Started

Mapping NIST CSF Controls: How to Get Started

Control mapping is the process of bringing together two or more compliance domains or sets of business requirements to build a strategy that aligns to your unique needs. While the NIST CSF controls set the standards for information security, which controls you apply and how you apply them depends on your unique business environment. Important factors to consider are your appetite for risk, the ...