The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

DFARS 252.204-7012: 14 Control Families You Can’t Afford to Overlook

March, 2023 | Foster Charles

Any Department of Defense (DoD) contractor must comply with the security standards of the Defense Federal Acquisition Regulation Supplement (DFARS) before it can be given access to controlled [...]

NIST Cybersecurity Framework for Small Business: 5 Useful Resources

NIST Cybersecurity Framework for Small Business: 5 Useful Resources

September, 2022 | Foster Charles

True or False: Cyber criminals would rather target large enterprises than small businesses. Answer: FALSE! One of the most pervasive myths about cybersecurity is the assumption that small businesses [...]

How to Implement NIST Cybersecurity Framework

How to Implement NIST Cybersecurity Framework

October, 2021 | Foster Charles

Organizations can no longer afford to view cybersecurity as a necessary evil and a mere cost center. Instead, they should view it as an integral component of their value propositions now that [...]

The NIST Framework Tiers Explained

The NIST Framework Tiers Explained

October, 2021 | Foster Charles

The NIST Cybersecurity Framework is a leading global standard in cybersecurity, as well as the basis of many legal regulations and other standards. There are three main elements to the framework – [...]

NIST CSF Controls: A Handy Checklist

NIST CSF Controls: A Handy Checklist

October, 2021 | Foster Charles

One of the most common drawbacks of cybersecurity frameworks and standards is that they fail to make a sufficiently compelling case to business leaders. Many focus on the needs of IT teams and [...]

CMMC Certification: Why Managed Detection and Response is Critical

CMMC Certification: Why Managed Detection and Response is Critical

August, 2021 | Foster Charles

The cybersecurity maturity model certification (CMMC) 2.0 requires a multilayered approach to information security. Of the 171 practices listed in the CMMC 2.0 cybersecurity framework, 11 fall into [...]

DFARS 252.204-7012: How effective are your access controls?

DFARS 252.204-7012: How effective are your access controls?

May, 2021 | Foster Charles

Access control is one of the fourteen groups of information security requirements specified by the NIST 800-171 standard. The standard aims to set a baseline for controlling access to any sensitive [...]

5 IT New Year's Resolutions Your Company Should Have

5 IT New Year's Resolutions Your Company Should Have

December, 2020 | Foster Charles

In the dynamic world of technology, the only thing you can count on is change. Your business always needs to be one step ahead when it comes to protecting your assets against the rising tide of [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”