Dr. Jerry Craig
As businesses continue to face rising cybersecurity threats, protecting your company’s digital assets is no longer a "nice to have"—it’sa must. In 2025, cyber insurance...
Ever thought about what would happen if a key part of your business suddenly went offline? Whether it’s your customer database, payment processing system, or...
Staying ahead of cybersecurity threats is more important than ever to keep your business safe. That’s why we recently sat down with Brad Hanly, Manager of MSP Sales...
Every day, businesses are hit with cyberattacks that compromise sensitive data, causing reputational damage, regulatory fines, and a loss of trust.
These incidents are...
Imagine finding out that a data breach happened because of an untracked piece of hardware or some outdated software. It's a nightmare scenario that puts your sensitive...
Entrusting certain aspects of your business operations to external organizations can feel like navigating a delicate balance.
Although outsourcing can provide cost...
As mobile technology takes over our daily lives, the boundaries between work and personal tech are fading fast, posing fresh challenges and decisions for businesses...
Every day, we're finding out just how much AI is changing the game, especially in the world of cybersecurity.
It's pretty interesting out there—an exciting mix of...
By now, most government contractors are aware of the upcoming Cybersecurity Maturity Model Certification (CMMC). This comprehensive guide will show you how to prepare,...
Is your company considering a merger or acquisition? Well, buckle up and get ready for a challenging journey through one of the most complex tasks your company may...
Data is not only your most valuable asset, but it can also be your biggest vulnerability in the ever-changing business landscape.
Insider threats, often overlooked amidst...
These days, phishing attacks pose a constant and imminent threat. They are both elusive and ever-evolving, capable of targeting anyone, anywhere.
That's why as...
Stepping into a cybersecurity audit can feel overwhelming, right? You've got to make sure everything's locked down tight, but where do you even start?
Well, diving...
Navigating the intricate world of cybersecurity can be tricky business, especially with terms like EDR and MDR flying around!
They might sound like secret codes, but...
Have you ever come across terms like IDS, IPS, SIEM and felt like you were decoding a tech riddle?
We understand your frustration! These terms are crucial in the world of...
Cyberattacks have become commonplace in the business landscape. Cyber insurance is more important than ever, but many don't understand how much coverage they need, what is...
Change and/or configuration management systems always seem to fall on the back burner while businesses are growing. After all, who has time to implement a thorough...
When is the last time you really tested your network infrastructure? More than just sending out a fake phishing email to your staff for employee training; serious disaster...
Ntiva helps government contractors achieve CMMC (Cybersecurity Maturity Model Certification) compliance as quickly and efficiently as possible so they can get back to...
It seems like new cybersecurity issues pop up every day. With more and more devices connecting to the internet, and default security settings leaving something to be desired,...
Penetration testing is the best way to know that your organization's data is secure, with no overlooked vulnerabilities or forgotten loopholes to allow your data to be...
Vulnerability management is a very deep topic, consisting of far more than just an anti-virus scan and an automated monthly report, but you don't need a degree in Computer...
It's 2023, and every company on the planet is fighting a daily battle against cyber threats and attacks. We're almost numb to the daily reports on breaches as the cybercrime...
Today we’ll break down CMMC Section 3.8, which focuses on the media protection for media that contains controlled unclassified information (CUI).
It’s important to remember...
Today we are focusing on a review of CMMC Section 3.6, which provides individual practices for incident response after a cyberattack. The biggest takeaway? Good cybersecurity...
When organizations are looking for ways to save money, cybersecurity sometimes ends up on the chopping block. For those companies fortunate enough to never have gone through...
By the time you get to the end of this sentence, a cybercriminal will have successfully attacked a business and infected it with ransomware. According to Cybercrime Magazine,...
When it comes to achieving CMMC compliance, the old business maxim holds true — it’s not what you know, it’s who you know.
One of the most vital protections you have against...
Configuration management is vital, both within the CMMC framework and in general from a security and IT perspective.
Configuration management ranks right up there with...
The Cybersecurity Maturity Model Certification 2.0 (CMMC) includes practices and controls that fall under the category of “Audit and Accountability.”
Unlike with other areas...
The U.S. Department of Defense (DoD) published Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) in November 2021 to safeguard sensitive national security...
If your organization is working toward Cybersecurity Maturity Model Certification (CMMC), then you will eventually come across the sections dealing with cybersecurity...
If your organization wants to achieve Cybersecurity Maturity Model Certification (CMMC), you need to understand Access Control.
Not just what it is, but the process. And the...
Artificial Intelligence (AI) is no longer a distant concept or passing trend; it has become a powerful, ever-present force that’s reshaping...
As AI technology continues to break new ground, Microsoft Copilot 365 stands out as a transformative solution that is reshaping the way we...
In a time when the truth isn't always what it seems, the rise of 'deepfakes'—a fusion of ' deep learning' and' fake'—represents a major change in how...