I recognize that a host of others are writing about CMMC and its ever-changing guidelines while in development. What I would like to do is present a simple view - where we are in the process and development stages and how they can potentially impact your business. First a few disclaimers, one, the development...
Continue readingCrowdStrike
Everyone has seen the recent news of the outage caused by a bad update to the CrowdStrike Agents. This is a good time for everyone to take stock of their own IT systems, disaster planning, and security configurations. First, if you follow Sher-Tech you know that we are generally don’t recommend companies use services...
Continue readingSurviving Below the Cybersecurity Poverty Line
Recently an article came out titled “How to Survive Below the Cybersecurity Poverty Line” which raised some interesting points for small to mid-sized businesses. The cybersecurity poverty line is defined as the point at which an organization does not “have the means and resources needed to achieve and maintain a mature security posture and...
Continue readingThe Future of Cyber-Insurance Policy Security Requirements
As Cyber Attacks continue to escalate, more and more businesses are looking to Cyber Insurance Policies to protect against financial losses. As cyber insurance becomes more popular, we at Sher-Tech are seeing changes to the underwriting process. Currently, when seeking an insurance policy, the insurance company will send you a questionnaire seeking information on...
Continue reading