The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

4 ways a backup and disaster recovery solution determines SOC 2 audit success

4 ways a backup and disaster recovery solution determines SOC 2 audit success

October, 2022 | Foster Charles

SOC 2 is an auditing procedure for service providers that's designed to evaluate data-management measures across five trust service principles. These include security, availability, processing [...]

SOC 2 Requirements: 5 of the Most Common Mistakes to Avoid

SOC 2 Requirements: 5 of the Most Common Mistakes to Avoid

September, 2022 | Foster Charles

Passing a SOC 2 audit validates your efforts to achieve a high standard of security and privacy. It can be a powerful tool in demonstrating your company’s commitment to keeping customer data safe and [...]

NIST Cybersecurity Framework for Small Business: 5 Useful Resources

NIST Cybersecurity Framework for Small Business: 5 Useful Resources

September, 2022 | Foster Charles

True or False: Cyber criminals would rather target large enterprises than small businesses. Answer: FALSE! One of the most pervasive myths about cybersecurity is the assumption that small businesses [...]

Can You Name the Cybersecurity Regulations That Apply to the Financial Industry?

Can You Name the Cybersecurity Regulations That Apply to the Financial Industry?

August, 2022 | Sal Marino

Charles IT · Can You Name the Cybersecurity Regulations That Apply to the Financial Industry? Financial services is one of the most heavily regulated sectors in the world as it plays a vital role in [...]

NIST CSF Profiles for Ransomware Risk Management

NIST CSF Profiles for Ransomware Risk Management

July, 2022 | Foster Charles

Ransomware is an ever-present risk these days, which is why businesses are constantly seeking ways to bolster their defenses. One excellent way of doing this is by using a robust cybersecurity [...]

How Does NIST CSF Relate to the Cybersecurity Safe Harbor Law?

How Does NIST CSF Relate to the Cybersecurity Safe Harbor Law?

July, 2022 | Foster Charles

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) provides voluntary, consensus-based industry standards and best practices for enhancing the security of [...]

How Does a vCISO Help Companies Pass Audits?

How Does a vCISO Help Companies Pass Audits?

May, 2022 | Foster Charles

A virtual chief information security officer (vCISO) is a third-party cybersecurity specialist who performs the same functions as an in-house chief information security officer (CISO). But unlike [...]

How a vCISO Helps Companies Stay On Top of Compliance Requirements

How a vCISO Helps Companies Stay On Top of Compliance Requirements

May, 2022 | Foster Charles

Over the years, cyberattacks have grown in number and complexity. In response to this threat, the government of the United States and many other countries have put in place various compliance [...]

How vCISO Services Can Help You Keep Pace with Information Security

How vCISO Services Can Help You Keep Pace with Information Security

May, 2022 | Foster Charles

Cisco defines information security as processes and tools designed and deployed to protect sensitive business information from unauthorized modification, disruption, destruction, and inspection. Put [...]

The Strategic Outline of a vCISO Program

The Strategic Outline of a vCISO Program

May, 2022 | Foster Charles

The Charles IT vCISO program is a multi-stage project that aims to completely revamp and improve the way your business approaches data protection. It’s a great way to keep up with the ever-evolving [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”