Lionfish Cyber Security

What is the Cybersecurity Maturity Model Certification (CMMC)?

Author TruMethods Standards Manager, Brian Dappolone If you have not heard of the Cybersecurity Maturity Model Certification (CMMC) yet, it is not the end of the world. The latest certification requirements were finalized by the Department of Defense (DoD) on January 31st and at the moment they are in the process of approving auditors for the …

What is the Cybersecurity Maturity Model Certification (CMMC)? Read More »

Recommended Best Practices for a Secure Supply Chain

Your business’ cybersecurity posture must prioritize detection, evaluation and mitigation of risks posed by your supply chain. It is vital that your security is upgraded on a regular basis to better prepare for any worst-case scenarios. Having said that, it should come as no surprise that a vulnerable third party that your organization deals with …

Recommended Best Practices for a Secure Supply Chain Read More »

artificial intelligence, robot, ai

Defense Strategies to Combat Insider Threats

Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Over 50 percent of organizations don’t have an Insider Risk Response Plan and 40 percent don’t assess how effectively their technologies mitigate insider threats.1 Even though 59 …

Defense Strategies to Combat Insider Threats Read More »

Making Security Awareness Second Nature

Your business’ security program must start with your employees and strong security policies rather than entirely depending on your IT team or the latest security solutions. You can significantly reduce the likelihood of a data breach by combining a well-drafted cybersecurity policy with comprehensive security awareness training.  It is your responsibility to implement security training …

Making Security Awareness Second Nature Read More »

Your Biggest Cybersecurity Risk: Your Employees

Cybercriminals work round the clock to detect and exploit vulnerabilities in your business’ network for nefarious gains. The only way to counter these hackers is by deploying a robust cybersecurity posture that’s built using comprehensive security solutions. However, while you’re caught up doing this, there is a possibility you may overlook mitigating the weakest link …

Your Biggest Cybersecurity Risk: Your Employees Read More »

Cyber Security Resolutions for SMBs

Small and mid-sized businesses still struggle to implement network security solutions. SMBs continue to identify budget constraints as the main barrier when it comes to IT security. This limitation in resources highlights another glaring statistic; 52% SMBs surveyed did not have a dedicated IT security professional on staff or distribute this responsibility across other roles. …

Cyber Security Resolutions for SMBs Read More »