Articles & Information
TOPICS:
External Service Providers in a Future CMMC 2.1 World
Unforeseen events in August caused a flurry of activity for both the Department of Defense and Industry. Specifically, the unintended release of draft materials for CMMC 2.1 Levels 1, 2, and 3, including scoping guidelines, which are the focus of this blog. ...
In the Land of CMMC When Does Level 1 Require Level 2?
Level 1 – More Problematic than You may Think As we rapidly conclude 2022, that would indicate that 2023 is about to commence. So what is so special about 2023? If you take a walk with me back to late 2021, when the Cybersecurity Maturity Model Certification...
When Cybersecurity Firms Live in Denial
Do Cybersecurity Firms Need Security? Unless you have been marooned on an island or are just coming out of a coma, you are probably aware that supply chain cyber-attacks are becoming increasingly more pervasive. So much so that the insurance industry now questions...
Changing Today’s Organizations from Expressive to Predictable Analytics
Achieving mission proficiencies through effective alignment of workload/manpower organizational structure Many organizations today determine their personnel requirements as part of an ongoing disciplined requirements-determination process. But is there a process...
State of the GovCon Union
Preamble My fellow Americans … for the 18th year, October has been designated National Cybersecurity Awareness Month. In that time, we have seen exceptional innovation in technologies which have allowed us to create next-generation aircraft and offensive...
The CMMC Compliance Countdown
How it all started One cool and brisk evening on the shores of the American Northeast on April 18th, 1775, a "spotter" saw something very disturbing through his portable telescope. The spotter immediately jumped on his horse and rode through town, yelling, "The...
CMMC 2.0 For Home Based Businesses
Requirements for Home Based Government Contractors Ever since the Cybersecurity Maturity Model Certification (CMMC) initiated back in 2019, there has been significant “spirited debates” on what do small business owners who operate home based businesses must do....
Incident Response Plan – Emergency Access
With cyberattacks being more pervasive and ransomware at the forefront of the news, ensuring continuity of operations is critical. Your organization’s ability to ensure continuity is dependent on your incident response capabilities. In this short video, you will...
Phishing campaigns target corporate emails. True, but they also target your personal emails and phones.
The past few months have been quite challenging in terms of ransomware. The United States had a pipeline completely shut down for several days, an international meat distribution point caused beef and chicken prices to skyrocket, and most recently Kaseya – who...
Information Technology Solutions
SoundWay has been helping the U.S. Government and its contractor partners achieve compliance & delivery success for over a decade
⋅ We’d like to hear from you ⋅
Contact us to learn more about how Soundway can help you.