FAQ

What is CMMC 2.0 and how can I become CMMC 2.0 compliant?

The Cybersecurity Maturity Model Certification (CMMC) is a new requirement for existing U.S. Department of Defense contractors and replaces earlier methods with independent, third-party certification. To achieve compliance, a company passes an audit run by a…

Read More

What is Controlled Unclassified Information (CUI)?

CUI stands for controlled unclassified information. It’s information that: The government owns or creates. Requires safeguarding or distribution controls that are consistent with applicable regulations, laws, and government-wide policies.  CUI is neither classified information in the traditional sense…

Read More

What is the primary purpose of penetration testing?

The primary purpose of a penetration test is to identify vulnerabilities in a network and remediate them before a threat actor can find and exploit them. Penetration tests are generally performed by scanning a network…

Read More

Why is cybersecurity important?

Cybersecurity is important because it helps protect sensitive data from unauthorized exposure, theft, or damage. Target data can include personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, and governmental and industry…

Read More

What is an MSP?

A managed services provider (MSP)  is an IT support services company that provides SMBs with IT support resources. Designed to help organizations address immediate and long-term IT objectives, these services include: Round-the-clock help desk support.…

Read More

What is an MSSP?

A managed security service provider is an IT firm that specializes in cybersecurity, governance, risk and compliance support (or GRC), and consulting services.   MSSPs help maintain and strengthen their clients’ cybersecurity infrastructure. They ensure that…

Read More