The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

When Do You Need to Meet the Requirements of NIST 800-171?

When Do You Need to Meet the Requirements of NIST 800-171?

June, 2021 | Foster Charles

Every business that works with the US Department of Defense needs to be compliant with the Defense Federal Acquisition Regulation Supplement (DFARS). This includes both contractors who work directly [...]

How Can A Small Business Approach Compliance?

How Can A Small Business Approach Compliance?

June, 2021 | Foster Charles

Protecting controlled unclassified information (CUI) has been a top priority for the Department of Defense and its 200,000-strong supply chain in recent years. Facing increasing threats from [...]

Understanding Subcontractor Responsibilities

Understanding Subcontractor Responsibilities

June, 2021 | Foster Charles

The Defense Industrial Base (DIB) is one of the largest supply chains in the world, employing over a million people in 200,000 organizations. Protecting that supply chain from threats such as [...]

What Does the Term ‘Adequate Security’ Really Mean?

What Does the Term ‘Adequate Security’ Really Mean?

June, 2021 | Foster Charles

The DFARS 252.204-7012 documentation requires defense contractors and subcontractors to implement adequate security measures to protect controlled unclassified information (CUI). This is, of course, [...]

What You Need to Know About Cyber Incident Reporting

What You Need to Know About Cyber Incident Reporting

June, 2021 | Foster Charles

Defense contractors operate in one of the most heavily regulated industry sectors of all. They face a wide range of threats from various sources, such as insider threat, social engineering, and [...]

5 Ways an MSP Is Your Biggest Compliance Ally

5 Ways an MSP Is Your Biggest Compliance Ally

June, 2021 | Foster Charles

Defense Federal Acquisition Regulation Supplement (DFARS) Clause 252.204-7012 covers everything contractors must know about safeguarding covered defense information (CDI) and reporting cyber [...]

Why Monitoring Is Key to System Integrity

Why Monitoring Is Key to System Integrity

June, 2021 | Foster Charles

Working as a contractor for the DoD requires compliance with the DFARS 252.204-7012 rules, which are based on the globally recognized NIST 800-171 guidelines. Meeting these rules is not a one-time [...]

How Strong Are the Boundaries of Your Systems?

How Strong Are the Boundaries of Your Systems?

June, 2021 | Foster Charles

DFARS 252.204-7012 Security Requirement 3.12.4 requires contractors of the Department of Defense to create and regularly update a system security plan. This plan should describe the boundaries of [...]

How A DFARS Gap Assessment Helps You Evaluate Security

How A DFARS Gap Assessment Helps You Evaluate Security

June, 2021 | Foster Charles

Keeping up with the demands of compliance is a constant challenge, especially for companies operating in a highly regulated sector like the Defense Industrial Base. DFARS 252.204-7012 compliance, [...]

DFARS 252.204-7012: Are the Safeguards for Your IT Systems Enough?

DFARS 252.204-7012: Are the Safeguards for Your IT Systems Enough?

June, 2021 | Foster Charles

Every business faces a unique set of risks across a number of key domains. If your company stores, processes, or transmits controlled unclassified information (CUI) in the capacity of a defense [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”