EvereTech became a corporate member of CompTIA. This provides employees access to: industry research; employee discounts for training and certifications; networking; communities and councils; events; education and retail discounts. EvereTech is proud to be a corporate member and excited to offer the membership benefits to employees.
Learn more about CompTIA Here: CompTIA Corporate Webpage
Malicious cyber activity cost the U.S economy between 50-100 billion dollars annually. Impacts can be very substantial when they affect the National Security mission. Malicious actors specifically target the Defense Industrial Base (DIB) (consisting of over 300,000 companies and vendors) as they support the warfighter mission.
The Cybersecurity Maturity Model Certification (CMMC), is designed to provide the DOD a verification mechanism designed to ensure that cybersecurity controls and processes adequately to protect Controlled Unclassified Information (CUI) that resides on the Defense Industrial Base (DIB) networks. The DoD expects to include requirements related to CMMC in Requests for Information (RFIs) or Source Sought notices by the summer of 2020. By the Fall of 2020, DoD expects to include specific language in all Requests for Proposals (RFPs). Fortunately, EvereTech is prepared to work with the U.S Department of Defense (DoD) to increase the cybersecurity posture within the multi-tier supply chain including the Cybersecurity Maturity Model Certification (CMMC). We employ the necessary policies and standards to protect the Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).
CMMC Maturity Model - Graphic
All information posted was from the Office of the Under Secretary of Defense - Acquisition and Sustainment release that was posted in January 2020. Link listed below.
Networks are only as strong as the individuals who use them. When passwords are managed by human defined passwords systems will always remain available for compromise. Passwords are too easy to guess. Additionally, many users repeat passwords and/or PINS across multiple systems allowing increased chances of compromises.
Replacement options for passwords include: iris scanners, fingerprint readers, facial recognition and other authentication factors.