• FISMA NIST 800-53 Rev. 4 Controls – By the Numbers

    Have you even been in a FISMA discussion or meeting and someone asked how many actual NIST 800-53 controls they needed to meet and no one seemed to have the exact answer? Well just to make it easy for you we prepared the two tables below that provide the total controls and enhancements for low, ... Read More →

  • Anatomy of a Phishing Email

    If you use email (which, if you’re reading this, you almost certainly do), you’ve probably heard of “phishing”. You’ve most likely also received (but hopefully didn’t fall for) at least one phishing message. Phishing is an online scam, usually conducted over email but sometimes through other communication services, which involves tricking someone into giving away ... Read More →

  • Cost of Becoming Fisma Compliant

    Many clients that are about to undergo a FISMA Assessment ask us what it costs to meet the requirements. There are several factors to consider when looking at the expense of becoming FISMA compliant, and it is hard to provide a dollar amount until a gap analysis is performed since we are not yet sure ... Read More →

  • Public WiFi: How to Stay Protected From Security Threats

    One of the conveniences of our modern world is free wireless Internet connections offered by businesses for use by their customers. This can be especially useful for employees who want to continue working or otherwise stay connected via their laptops. But many people don’t realize the security issues with using public Wi-Fi connections. Luckily, once ... Read More →

  • Rogue Access Points

    It’s common security practice for a company to make sure all their wireless access points are secured. After all, the range of a wireless access point can potentially extend to a physical area outside of the company’s control. This means that no matter how hard you try to prevent people from trespassing onto the company’s ... Read More →