Blog

CMMC Levels Explained: A Guide to CMMC 2.0 Certification Levels

How many CMMC levels are there? The latest CMMC 2.0 model has three levels (replacing the five-tier system in CMMC 1.02). Announced on July 17, 2021, the three CMMC levels are Level 1 (Foundational), Level 2 (Advanced), and Level 3 ...

JUST OUT - CRITICAL CMMC ANNOUNCEMENT

JUST OUT - CRITICAL CMMC ANNOUNCEMENT Critical information just released regarding CMMC Program. The Rule for CMMC moved to the Office of Management and Budget. That means a timer has started, 90 days or less, for the review to complete. Expect ...

Measures to take to safeguard employees from identity theft

Here are several measures you can take to help safeguard your employees from identity theft: Educate employees: Provide comprehensive training on identity theft risks and preventive measures. Strong password policies: Enforce strict password policies and encourage the use of password ...

Who is subject to Standards, Certifications and Regulations?

Who is subject to which Standards, Certifications and Regulations?  American Data Privacy and Protection Act (ADPPA) all organizations that treat consumer data; this applies to most entities, including nonprofits and common carriers  ...

Cisco’s Cybersecurity Readiness Index: Challenges - Opportunities

Cisco’s recent Cybersecurity Readiness Index sheds light on the current state of cybersecurity across various industries and offers insights into how companies can fortify their defenses in this ever-evolving landscape.   The findings of the survey reveal a concerning reality: ...

Glossary of Terms in Cyber Security

AICPA is the acronym for the American Institute of Certified Public Accountants. The AICPA is the originator of the SOC (System and Organization Controls) audit and reporting standards. Approved Scanning Vendor (ASV) What is an Approved Scanning Vendor (ASV)? Company approved ...

The vCISO role: 

The vCISO role comprises the following: Focus on: • Cyberattacks: Development and implementation of processes and systems used to ...

Recommendations for protecting company data:

Recommendations for protecting company data: Encryption: Implement encryption for all sensitive data both in transit and at rest. Firewall: Deploy a firewall to secure the network perimeter and control incoming and outgoing traffic. Access control: Implement strong access controls, such ...

The Ten Best Practices for Vulnerability Management

The Ten Best Practices for Vulnerability Management 1. Inventory and monitor your Assets: Hardware and Software. 2. Regularly scan for vulnerabilities: Use automated ...

What should an enterprise risk management plan and strategy include in 2022?

An Enterprise Risk plan should start with a Baseline understanding of the following: An understanding of the Business environment. Business size, scope of industry ...

Contact

Gailey SolutionsGailey Solutions Logo $$$
  • 4612 Adrian Way
    Plano, TX 75024
  • Phone: 214-336-1286
  • Phone: 214-336-1286

Social Media