The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

How to Prepare for HIPAA Certification for IT Professionals

How to Prepare for HIPAA Certification for IT Professionals

March, 2023 | Sal Marino

Healthcare information technology systems are a favorite target for cybercriminals. Protected health information (PHI) contains a wealth of valuable data that can sell for a lot of money on dark web [...]

How Much Do You Know About Data Backup and Disaster Recovery?

How Much Do You Know About Data Backup and Disaster Recovery?

March, 2023 | Foster Charles

Do you have regular data backups in place? How about a detailed disaster recovery plan? If not, you may be jeopardizing your business’s ability to operate if disruptions do occur.

DFARS Compliance Checklist for Manufacturing Companies

DFARS Compliance Checklist for Manufacturing Companies

March, 2023 | Foster Charles

Companies that manufacture products for the US Department of Defense (DoD) must comply with cybersecurity standards set by the Defense Federal Acquisition Regulation Supplement (DFARS). These [...]

What is Endpoint Encryption and Why Do You Need It?

What is Endpoint Encryption and Why Do You Need It?

March, 2023 | Foster Charles

Do you have the proper endpoint encryption worked into your business? If you’ve never heard of this term and don’t have a dedicated security team, odds are your business is lacking when it comes to [...]

What is a HIPAA security risk assessment, and who needs one?

What is a HIPAA security risk assessment, and who needs one?

March, 2023 | Foster Charles

The healthcare sector is a favorite target for cybercriminals and state-sponsored hackers. Contrary to popular belief, things like stolen medical records are worth far more on the dark web than [...]

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

March, 2023 | Foster Charles

Any Department of Defense (DoD) contractor must comply with the security standards of the Defense Federal Acquisition Regulation Supplement (DFARS) before it can be given access to controlled [...]

4 Important Issues External Vulnerability Scanning Can Reveal

4 Important Issues External Vulnerability Scanning Can Reveal

March, 2023 | Foster Charles

Most data breaches are easily avoidable if you take a proactive approach to manage your IT environment. Unfortunately, many businesses have historically relied only on reactive measures, such as [...]

DFARS vs CMMC: What's the Difference?

DFARS vs CMMC: What's the Difference?

March, 2023 | Foster Charles

If you’re an existing US Department of Defense (DoD) contractor, then you’ve probably achieved Defense Federal Acquisition Regulation Supplement (DFARS) compliance by now. But did you know that CMMC [...]

Why Use Multi-Factor Authentication: 5 Top Reasons

Why Use Multi-Factor Authentication: 5 Top Reasons

March, 2023 | Jack Ardrey

With cyber attacks increasing at a rapid rate, the importance of securing your organization at every level is crucial. What's one of the best ways to secure your network? You guessed it - [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”