The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

How Can Your Business Qualify Under the Safe Harbor Law?

How Can Your Business Qualify Under the Safe Harbor Law?

March, 2022 | Foster Charles

Several states across the United States, including Connecticut, recently passed the Cybersecurity Safe Harbor Law. This landmark legislation is important for both businesses and consumers because it [...]

Understanding the Purpose of NIST CSF Controls

Understanding the Purpose of NIST CSF Controls

October, 2021 | Foster Charles

The NIST Cybersecurity Framework was first released in 2014 with the purpose of promoting better risk management and innovation across the critical infrastructure sector in the US. Since then, it has [...]

Why Following NIST CSF Requirements is More Important Than Ever

Why Following NIST CSF Requirements is More Important Than Ever

September, 2021 | Sal Marino

Far too many business leaders still consider the needs of information security to be a burden, and a costly and time-consuming one at that. But as the threat landscape continues to evolve alongside [...]

Why is the NIST Cybersecurity Framework Important?

Why is the NIST Cybersecurity Framework Important?

September, 2021 | Foster Charles

Organizations of all types and sizes face unrelenting threats from malicious actors, including organized cybercrime, corporate espionage, and state-sponsored attackers. Every business owes it to [...]

How Can the NIST Cybersecurity Framework Help Small Businesses?

How Can the NIST Cybersecurity Framework Help Small Businesses?

September, 2021 | Foster Charles

Many small businesses do not consider themselves worthy enough targets for more advanced attacks, such as advanced persistent threats (APTs). As such, they often have only minimal cybersecurity [...]

What is NIST Cybersecurity Framework?

What is NIST Cybersecurity Framework?

September, 2021 | Foster Charles

The NIST cybersecurity framework is a globally recognized standard that offers guidance on how organizations can mitigate information security risks. It is updated regularly to reflect the most [...]

  • 1
  • 2

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”