The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DFARS 252.204-7012: How do your accountability standards measure up?

DFARS 252.204-7012: How do your accountability standards measure up?

May, 2021 | Sal Marino

When a data breach occurs, one of the first things business leaders tend to think about is who or what to blame. This can be a difficult question to answer, in which case the blame will likely shift [...]

DFARS 252.204-7012: Could a lack of training be putting you at risk?

DFARS 252.204-7012: Could a lack of training be putting you at risk?

May, 2021 | Foster Charles

Most people still think of cybersecurity as a technical challenge and that only the IT department needs to worry about it. This widespread misconception is exactly the reason why employees are often [...]

DFARS 252.204-7012: How effective are your access controls?

DFARS 252.204-7012: How effective are your access controls?

May, 2021 | Foster Charles

Access control is one of the fourteen groups of information security requirements specified by the NIST 800-171 standard. The standard aims to set a baseline for controlling access to any sensitive [...]

5 Common Misconceptions About Managed Service Providers

5 Common Misconceptions About Managed Service Providers

December, 2020 | Foster Charles

Admittedly, not all managed service providers (MSPs) are created equal. As is the case in any industry, there are both good and bad options. Making the right choices depends on extensive research, as [...]

Cybersecurity in 2021: Charles IT’s Top 6 Recommendations

Cybersecurity in 2021: Charles IT’s Top 6 Recommendations

December, 2020 | Foster Charles

Change is the only constant in the world of cybersecurity, where new threats come and go as cybercriminals exploit new opportunities.

5 Tips to Achieve DFARS Compliance

5 Tips to Achieve DFARS Compliance

July, 2020 | Foster Charles

The US Department of Defense (DoD) handles a lot of controlled unclassified information (CUI), which requires “safeguarding or dissemination controls pursuant to and consistent with applicable law, [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”