Manufacturing and CMMC 2.0

Hill Tech Solutions’ Principal Consultant, Ron Hill, CISSP spoke at the RAMP (Regional Additive Manufacturers Partners) MD symposium in Harford County, MD, about the coming Cybersecurity Maturity Model Certification (CMMC 2.0) and its importance to manufacturers. Here are his remarks: Good morning, I’m Ron Hill with Hill Tech Solutions. I want to talk about something […]

Time to Say Goodbye to P@$$w0rds Like This?

Just in time for National Cybersecurity Awareness Month, the National Institute of Standards and Technology (NIST) has updated its password security guidelines in a way that brings some major changes to conventional wisdom on the topic. The changes appear in NIST Special Publication 800-63B, aimed at cloud services providers (CSPs). Some of the revisions will […]

Malvertising: A New Path for Hackers

Much of the focus in the cybersecurity arena over the past few years has been on email as a point of entry, and with good reason. Both ransomware attacks and the phishing attempts that make many of them possible are on the rise, threatening organizations of all sizes. Training team members to recognize these attempts […]

Hashing and Salting: Better Password Security

In this age of rampant and expensive ransomware attacks, many organizations find it necessary to revisit security procedures. The venerable username and password login doesn’t lend itself to good security (especially when 72% of workers admit to using the same password across four or more accounts), and while multi-factor authentication helps quite a bit, it’s […]

So … Who Got Hacked Today?

This year of 2024 has brought a seemingly endless series of cybersecurity incidents targeting some of the biggest brand names and the products in the most widespread use. The techniques and the amount and types of information compromised have varied, but it all adds up to one large and disturbing picture. Let’s take a look: […]

Dealerships Dealing with CDK Hack

By now you’ve probably heard about the ransomware attack on CDK Global, a software provider serving some 15,000 auto dealerships in the U.S. In the ongoing debate over whether victims should or should not pay ransom, it appears CDK did, and pretty quickly. But there was, and is, a lot to untangle. CDK provides software […]

It’s Happening: CMMC Rule Submitted for Final Review

Showing surprising speed for anything governmental, the Department of Defense (DoD) has submitted the CMMC 2.0 program rule and supporting documentation to the Office of Information and Regulatory Affairs. What that means to affected companies is that the window to achieve compliance is a shorter one than had been anticipated. Demonstrating the urgency required by […]

The Kaspersky Ban – What You Should Know

You may have heard by now that the U.S. government is banning security software from Kaspersky. You may not know why, or what it means for Kaspersky users. Here’s a rundown: Background. Founded in 1997 and headquartered in Moscow, Kaspersky established an international footprint as a major security software vendor, reaching $704 million in annual […]

The Buy Maryland Cybersecurity (BMC) Tax Credit

By now you know that cyber threats represent an existential threat to businesses of all sizes. You’ve seen countless stories about ransomware and phishing attempts, social engineering, and even deepfake videos, all designed to separate businesses from their money. So you know that you need strong cyber defenses in place. What you might not know […]

CMMC 2.0 Compliance: Avoid These 5 Errors

As CMMC 2.0 moves towards implementation, more and more companies are facing the need to achieve compliance. If you’re new to CMMC, it’s a framework designed to protect sensitive unclassified information from the ever-increasing threat of cyberattacks. The government has recognized that not only its own assets, but those of connected vendors – and their […]