The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

What is a HIPAA security risk assessment, and who needs one?

What is a HIPAA security risk assessment, and who needs one?

March, 2023 | Foster Charles

The healthcare sector is a favorite target for cybercriminals and state-sponsored hackers. Contrary to popular belief, things like stolen medical records are worth far more on the dark web than [...]

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

March, 2023 | Foster Charles

Any Department of Defense (DoD) contractor must comply with the security standards of the Defense Federal Acquisition Regulation Supplement (DFARS) before it can be given access to controlled [...]

4 Important Issues External Vulnerability Scanning Can Reveal

4 Important Issues External Vulnerability Scanning Can Reveal

March, 2023 | Foster Charles

Most data breaches are easily avoidable if you take a proactive approach to manage your IT environment. Unfortunately, many businesses have historically relied only on reactive measures, such as [...]

Why Use Multi-Factor Authentication: 5 Top Reasons

Why Use Multi-Factor Authentication: 5 Top Reasons

March, 2023 | Jack Ardrey

With cyber attacks increasing at a rapid rate, the importance of securing your organization at every level is crucial. What's one of the best ways to secure your network? You guessed it - [...]

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

How A Cybersecurity Audit Can Reveal Your Cyber Readiness

February, 2023 | Foster Charles

When was the last time you had a cybersecurity audit? If it takes you more than a few seconds to think back, odds are it’s been too long. As your business becomes more reliant on technology to manage [...]

What is External Vulnerability Scanning?

What is External Vulnerability Scanning?

February, 2023 | Charles IT

Is the sensitive information of your business properly protected? Cyber attacks present an increasing risk for organizations, with recent data showing that 2021 was plagued with 50% more cyber [...]

The 5 Most Commonly Missed Requirements for Cyber Insurance

The 5 Most Commonly Missed Requirements for Cyber Insurance

February, 2023 | Foster Charles

If you’d asked a business owner ten or even twenty years ago if they had cyber insurance, they’d probably have given you a puzzled look. Cyber insurance wasn’t always available for business owners [...]

How Do the Types of Multi-Factor Authentication Work?

How Do the Types of Multi-Factor Authentication Work?

February, 2023 | Foster Charles

If you’ve been reading about how to increase security in your business, you’ve most likely stumbled across multi-factor authentication. Multi-factor authentication will mean something different based [...]

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

Does Your Financial Firm Follow All SEC Cybersecurity Requirements?

January, 2023 | Sal Marino

The SEC is ramping up cybersecurity compliance efforts, recently issuing First American Financial Corporation over $487,000 in fines for poor vulnerability management that put their investors’ [...]

What is Multi-Factor Authentication?

What is Multi-Factor Authentication?

January, 2023 | Foster Charles

When you log in to one of your online accounts, you are going through a process called authentication. Traditional authentication involves a username and password; however, many users pick simple [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”