CMMC – What Is It, and Why Does It Matter?
by Derek Boczenowski on June 24, 2020 at 1:00 PM
There has been a lot of discussion around the cybersecurity interwebs lately about something called CMMC. CMMC stands for Cybersecurity Maturity Model Certification, which sounds super fancy and important, but what does it really mean?
Lessons Learned from a Part-Time Teleworker in Quarantine
by Derek Boczenowski on March 31, 2020 at 1:00 PM
If you read our blog on a regular basis, you have seen more than one excellent discussion on pandemic planning and how to set up remote workers with proper policies, process, hardware, and software to ensure secure and compliant ways to keep working from home.
Top 5 vCISO Takeaways of 2019
by Derek Boczenowski on January 8, 2020 at 1:00 PM
As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …
Securing Your Cloud Environment – Who is Responsible?
by Derek Boczenowski on September 18, 2019 at 1:00 PM
The speed at which technology progresses is truly staggering. I am old enough to remember having to load 9-track magnetic tapes to install a patch, and marveled at the lightning fast 384k connection for an entire organization, thinking we had finally made the big time.
Cybersecurity - Back to Basics
by Derek Boczenowski on June 14, 2019 at 1:00 PM
Welcome to summer in New England! Or close to it at any rate. Today I would like to talk about a slightly different topic than usual on these blogs. For those of you that have read past entries, you know they are full of good advice on not many different compliance issues.
Updates to MA 201 CMR 17 Data Breach Law
by Derek Boczenowski on February 1, 2019 at 1:00 PM
The Laws, they are a’ changin’… …to paraphrase Bob Dylan. And I’m speaking about privacy and breach laws. It would seem that every other day we hear of another set of customer data being compromised at another company. It could be just name and address, but it could be phone number, S …
.webp?width=2169&height=526&name=Compass%20regular%20transparent%20website%20(1).webp)
-1.webp?width=2169&height=620&name=Compass%20regular%20transparent%20website%20smaller%20(1)-1.webp)





