Last month we released our new cyber insurance report which is an in depth look into this topic, but we wanted to touch on what we’re specifically seeing so far in 2022 in today’s article because from what we’re seeing in from our clients and in the industry – cyber insurance requirements are on the rise.
Cyber Insurance – What you can do to ensure your business will be covered in 2022
CMMC Series: Tier Three Overview
We’ve covered tier one and tier two of the Cybersecurity Maturity Model Certification (CMMC) program, and this week we’ll be tackling tier three.
Before we dive in, we want to mention that we’re covering tier three as it exists currently (in 2022), version 1.0 has five tiers but once version 2.0 of the program releases it will be reduced to three tiers.
Five Must Have Features in a Business Continuity Plan
CMMC Series: Tier Two Overview
This is the third week of our Cybersecurity Maturity Model Certification (CMMC) Series. You can find week one, which was a look at what’s happening with CMMC in 2022 here. Last week, we gave you an overview of tier one which you can review here.
Tier one in CMMC really covers the basic foundational steps you must take to move on to tier two and tier three.
The 5G rollout and the concern over C-band has caused some airlines to cancel flights
Even though major carriers AT&T and Verizon scaled back their 5G rollout scheduled for yesterday, some flights were cancelled or rerouted anyways due to the concerns that 5G could cause airline equipment to malfunction.
AT&T and Verizon turned on sections of their C-band 5G networks across the US on Wednesday but have agreed to hold off on enabling it directly near airports for now.
CMMC Series: Tier One Overview
Last week we covered a general overview of what the Cybersecurity Maturity Model Certification (CMMC) program is and what’s been announced for 2022 so far. Presently, there are five maturity tiers found in program, although if (or when) version 2.0 is released it’s been announced that the program will be simplified down to just three tiers.
Norton’s Antivirus Software Comes with a Crypto Miner, and They’re Not Alone
Last week a claim unfolded on Twitter that Norton was installing crypto mining software without authorization on PC’s which then rose to the level of outrage amongst some Norton antivirus software customers.
The truth on the subject is a mixed bag, while it’s true they are installing a crypto miner on customer machines it’s not active on every machine, customers must authorize the process before the device will begin mining crypto (in this case Ethereum). If you authorize Norton to begin mining cryptocurrency on your device they will setup a wallet for you and after a small cut, and then deposit your earnings there when you meet a certain threshold.
CMMC Series: What’s Happening in 2022
We’ve touched on the Cybersecurity Maturity Model Certification (CMMC) before in this blog, but over the next five weeks we’ll be doing a deep dive into this particular cybersecurity framework in our new CMMC Series. Starting with today’s post on what’s happening currently and what we can expect in 2022.
At Valley Techlogic, we believe a good cybersecurity framework can be the backbone for businesses looking to beef up their cybersecurity implementation.
New Year, New Bugs – The Y2K22 Bug Crippling Exchange Servers
We hope everyone had a wonderful New Year but unfortunately for those with 2016/2019 Exchange servers, the turning of the clocks to 01/01/2022 led to an unpleasant bug.
Computer bugs related to a New Years event aren’t uncommon, we created this infographic about other times this has happened (as well as a notable future one).
The error this time was caused by the date checking within the anti-malware portion of Exchange.
LastPass say they didn’t leak your password, however some users still received alarming alerts
Yesterday, a number of LastPass users received alarming alerts in their email inbox that their passwords – including their master password – had been compromised. The news quickly spread across the internet, starting with forums, and then making its way to Twitter where it was picked up by larger news outlets.