Blog

Starting Point for Cyber Security Program - NIST for SMB

NIST Cybersecurity Framework 2.0:  Small Business Quick-Start Guide Overview https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1300.pdf Great starting point for an understanding Cyber Security, and most of it's basic components for SMB adoption. Need help and guidance executing ...

Mother of all breaches, what we know so far. What to do now!

Mother of all breaches, what we know so far. What to do now!   There are data leaks, and then there’s this. A supermassive Mother of all Breaches (MOAB for short) includes records from thousands of meticulously compiled and reindexed ...

Cyber Security Program Management - Services for SMB - Enterprise

                      Only large Enterprises have the resources and internal talent to ...

Latest Ransomware Breaches: A Cause for Concern

Ransomware attacks have become increasingly common and sophisticated in recent years. In 2023, there have been a number of high-profile ransomware breaches, impacting organizations of all sizes and industries. Here is a roundup of some of the latest ransomware breaches: ...

CMMC Levels Explained: A Guide to CMMC 2.0 Certification Levels

How many CMMC levels are there? The latest CMMC 2.0 model has three levels (replacing the five-tier system in CMMC 1.02). Announced on July 17, 2021, the three CMMC levels are Level 1 (Foundational), Level 2 (Advanced), and Level 3 ...

JUST OUT - CRITICAL CMMC ANNOUNCEMENT

JUST OUT - CRITICAL CMMC ANNOUNCEMENT Critical information just released regarding CMMC Program. The Rule for CMMC moved to the Office of Management and Budget. That means a timer has started, 90 days or less, for the review to complete. Expect ...

Measures to take to safeguard employees from identity theft

Here are several measures you can take to help safeguard your employees from identity theft: Educate employees: Provide comprehensive training on identity theft risks and preventive measures. Strong password policies: Enforce strict password policies and encourage the use of password ...

Who is subject to Standards, Certifications and Regulations?

Who is subject to which Standards, Certifications and Regulations?  American Data Privacy and Protection Act (ADPPA) all organizations that treat consumer data; this applies to most entities, including nonprofits and common carriers  ...

Cisco’s Cybersecurity Readiness Index: Challenges - Opportunities

Cisco’s recent Cybersecurity Readiness Index sheds light on the current state of cybersecurity across various industries and offers insights into how companies can fortify their defenses in this ever-evolving landscape.   The findings of the survey reveal a concerning reality: ...

Glossary of Terms in Cyber Security

AICPA is the acronym for the American Institute of Certified Public Accountants. The AICPA is the originator of the SOC (System and Organization Controls) audit and reporting standards. Approved Scanning Vendor (ASV) What is an Approved Scanning Vendor (ASV)? Company approved ...

Contact

Gailey SolutionsGailey Solutions Logo $$$
  • 4612 Adrian Way
    Plano, TX 75024
  • Phone: 214-336-1286
  • Phone: 214-336-1286

Social Media