Mind the Gaps: CMMC Compliance by the Numbers
For more than two years now, we’ve been issuing regular reminders about mandatory CMMC compliance for organizations handling federal contract information (FCI) or controlled unclassified information (CUI). We’ve followed the long and winding journey of the CMMC rule from proposal to revision to adoption as the law of the land. While some may view CMMC […]
Why “Going Offline” Won’t Save You from Cyberattacks
During a recent chat with a potential client, we heard a familiar cybersecurity strategy: “We stay offline as much as possible—hackers can’t attack what they can’t reach, right?” It sounds logical. But unfortunately, it’s a risky misconception. Staying disconnected really a viable strategy against ransomware or other malware? Not really, and here’s why: Staying offline […]
Using AI Securely in Business
Maybe your use of artificial intelligence is limited to having ChatGPT rewrite the occasional proposal or business plan. Or perhaps you’ve instituted chatbots to answer common customer inquiries, or you’ve deployed AI solutions to streamline accounting or bookkeeping. Many businesses are just beginning to discover the potential of AI, while others are jumping in with […]
A Perfect Ten: Hill Tech Solutions Celebrates a Decade in Business
Hill Tech Solutions celebrates ten years in business this week, and we’re very proud to have reached this milestone. Enduring and thriving for a full decade in any industry is difficult, but amid the constant and rapid changes in the world of information technology, the challenges are even greater. It would be nearly impossible to […]
What Time Is It? CMMC Time.
On December 16, the final CMMC 2.0 rule went into effect. As you know, CMMC 2.0 is an updated cybersecurity standard affecting those organizations that handle federal contract information (FCI) or controlled unclassified information (CUI), as well as their subcontractors. While there has been some discussion over whether the rule will change as a new […]
CMMC 2.0 – Why Certifications Matter
CMMC (Cybersecurity Maturity Model Certification) 2.0 is now the law of the land, and compliance is no longer optional for any organization handling federal contract information (FCI) or controlled unclassified information (CUI). As you undertake your journey towards CMMC 2.0 compliance, you’ll encounter a number of acronyms related to the professional certifications of the providers […]
Social Media and Social Engineering: You Are the Weakest Link
In today’s environment of rampant data breaches and ransomware attacks, the focus often turns to hardware and software solutions. These are a vital part of any organization’s defenses, to be sure, and should be regularly maintained and updated. In most cases, however, the biggest threat to an organization’s cybersecurity standing is not in a computer, […]
Manufacturing and CMMC 2.0
Hill Tech Solutions’ Principal Consultant, Ron Hill, CISSP spoke at the RAMP (Regional Additive Manufacturers Partners) MD symposium in Harford County, MD, about the coming Cybersecurity Maturity Model Certification (CMMC 2.0) and its importance to manufacturers. Here are his remarks: Good morning, I’m Ron Hill with Hill Tech Solutions. I want to talk about something […]
Time to Say Goodbye to P@$$w0rds Like This?
Just in time for National Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has updated its password security guidelines in a way that brings some major changes to conventional wisdom on the topic. The changes appear in NIST Special Publication 800-63B, aimed at cloud services providers (CSPs). Some of the revisions will […]
Malvertising: A New Path for Hackers
Much of the focus in the cybersecurity arena over the past few years has been on email as a point of entry, and with good reason. Both ransomware attacks and the phishing attempts that make many of them possible are on the rise, threatening organizations of all sizes. Training team members to recognize these attempts […]