The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Technology Checklist for CMMC Level 1

Technology Checklist for CMMC Level 1

September, 2020 | Foster Charles

Did the expensive and resource-intensive requirements of Defense Federal Acquisition Regulation Supplement (DFARS) compliance prevent you from bidding on a US Department of Defense (DoD) contract [...]

The Importance of Endpoint Encryption for DoD CMMC Requirements

The Importance of Endpoint Encryption for DoD CMMC Requirements

September, 2020 | Foster Charles

One of the most crucial aspects of the Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) requirements involves the strict implementation of data privacy protocols. Both small [...]

The CMMC Application Process: What You Need to Know

The CMMC Application Process: What You Need to Know

September, 2020 | Foster Charles

The US Department of Defense (DoD) works with over 300,000 contractors and subcontractors every day. These companies handle a huge amount of sensitive government information, such as federal contract [...]

5 Tips For Implementing A System Security Plan For The DoD CMMC Framework

5 Tips For Implementing A System Security Plan For The DoD CMMC Framework

September, 2020 | Foster Charles

The Cybersecurity Maturity Model Certification (CMMC) is a universal cybersecurity standard, which applies across the entire supply chain of the US Department of Defense. This includes over 300,000 [...]

DoD CMMC FAQs: Questions Answered

DoD CMMC FAQs: Questions Answered

September, 2020 | Foster Charles

To protect controlled unclassified information (CUI) that the US Department of Defense (DoD) handles, the department initially required its contractors to comply with the cybersecurity requirements [...]

Why Managed Detection and Response is Important for CMMC Version 1.0

Why Managed Detection and Response is Important for CMMC Version 1.0

September, 2020 | Foster Charles

Change is the only constant in the world of cybersecurity. The threat landscape continues to evolve as hackers and scammers grow bolder and more consistent as they find ways to obtain confidential [...]

Do You Need GCC High to Be CMMC 2.0 DoD Compliant?

Do You Need GCC High to Be CMMC 2.0 DoD Compliant?

September, 2020 | Foster Charles

Contractors and subcontractors working for the US Department of Defense (DoD) are required to comply with security regulations such as the Defense Federal Acquisition Regulation Supplement (DFARS) [...]

Four Steps to Becoming CMMC 2.0 Certified

Four Steps to Becoming CMMC 2.0 Certified

August, 2020 | Foster Charles

If you are a contractor for the US Department of Defense (DoD), you’ve probably already prepared for Cybersecurity Maturity Model Certification (CMMC). The CMMC 2.0 is a program that measures [...]

A Guide to CMMC 1.0: What Companies Should Know

A Guide to CMMC 1.0: What Companies Should Know

August, 2020 | Foster Charles

On 31 January 2020, the Department of Defense (DoD) launched the first finalized version of the Cybersecurity Maturity Model Certification (CMMC). The CMMC version 1.0 is a new set of regulations [...]

CMMC 2.0 vs. NIST 800-171: Important Differences

CMMC 2.0 vs. NIST 800-171: Important Differences

August, 2020 | Foster Charles

The US Department of Defense (DoD) supply chain is a prime target for cybercriminals and hostile nations looking to steal and expose sensitive government information. These threats led to the [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”