Remove blog cyber-security-risk-assessment-checklist
article thumbnail

What is CMMC Compliance: An Authorized C3PAO Perspective

Etactics

At the time of writing this blog, there are currently 29 CMMC 3rd Party Assessor Organizations (C3PAOs) listed in The Cyber AB Marketplace. These organizations have passed a third party assessment. The founders were information security assessors. About Kompleye. Kompleye formed in late 2019. The CMMC Compliance Journey.

article thumbnail

Medical Identity Theft: Everything Patient's and Practice's Need to Know

Etactics

These are both huge risks when it comes to the security of personal information. But, unfortunately, the risks don’t end there. Social Security Number. Not only does the perpetrator steal their victim’s data, but they put the patient at risk by messing with their medical data and history.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

An Explanation of All 17 Required CMMC Level 1 Controls

Etactics

Just over the past year, we’ve seen hacker groups target and successfully infiltrate some of the most secure internet systems in the world. Both massive attacks occurred due to poor password management, which further solidifies the notion that employees are the biggest risk to an organization. Enter CMMC, stage left.

article thumbnail

The Ultimate CMMC Scoping Guide: A Matrix for Every Level

Etactics

That statement is part of the reason why we made a checklist in the first place. The scope includes assets that provide security or process, store or send sensitive information. The purpose of this blog is to provide a resource that documents how to tailor the 320 objectives within NIST SP 800-171A to the CMMC scope.

article thumbnail

66 Must-Have Interview Questions for Incident Response

Etactics

Taking into account the results of a risk assessment will help you learn how to prevent security breaches. Names, credit card numbers, social security numbers, and more (if left undefended) can result in identity theft or fraud. If you’re an organization that has cyber-related assets, you should be paying attention.