Corrective Actions – Make them Work For You

susceptibility emi emc testing

Corrective Actions Provide Opportunities for Improvement Corrective Actions are excellent opportunities for process improvement and increasing profitability.   It is necessary however, to implement a process to these control corrective actions.  This is often perceived by some as being a cumbersome, unnecessarily complicated, and time consuming process.  However, a properly constructed Quality Management System can ensure … Read more

Spyware a Growing Concern for Businesses

spyware a growing concern for businesses

According to a number of leaders in cybersecurity, spyware is becoming an issue of growing concern for businesses.  Malwarebytes, in its 2021 report, Malwarebytes 2021 State of Malware Report, observed that business spyware detections increased 51% in 2020.  These spyware infections can be found on both computers and mobile devices. What is Spyware? Spyware is … Read more

Technical Data and Export Law – Canada and the U.S.

technical data and export law

Technical Data and Export Law Understanding what technical data is and how it pertains to export law is important for companies doing business in the U.S. and Canada.  Both countries have different requirements and regulations controlling how technical data is stored and transferred.  Additionally, these regulations are subject to change. What is Technical Data? Definitions … Read more

ISO 9001 Business Management Beyond Quality

iso-9001 business management

ISO 9001 provides tools for business management beyond the scope of product quality.  Incorporating these tools can help an organization effectively and consistently manage specific issues and requirements strategically.  Furthermore, because ISO 9001:2015 requires involvement from top management and relevant stakeholders, it ensures that these issues will be addressed comprehensively.  Context of the Organization “Context … Read more

SuperMicro Hardware Hack on Server Motherboards

Supermicro Hardware Hack

Bloomberg reported on February 12, 2021 that a Supermicro hardware hack had been conducted on server motherboards by a Chinese espionage program.  This report follows previous reports by the news agency in 2018 and illustrates the susceptibility of technology manufacturers to supply chain attacks.  The hack involved embedding a small integrated circuit into the trace … Read more

Managing an Export Compliance Program

Managing an Export Compliance Program

Managing an Export Compliance Program properly ensures its effectiveness.  Any plan, no matter how well conceived, is only as effective as its execution.  Given the importance of export compliance to the sustainability of a business this is a task that must be addressed appropriately. Technology Control Plan – ITAR A Technology Control Plan (TCP) is … Read more

Effective Quality Management Documentation

Creating Effective Quality Management Documentation Effective Quality Management Documentation is the backbone of a ISO 9001:2015 quality program.  The documentation created therefore should be clear, concise, and targeted for its intended audience.   Documents serve to explain and instruct all stakeholders on policies, procedures, and work instructions.  They also provide the basis for evaluation for continuous … Read more

Effective Quality Management Systems Implementation

Effective Quality Management Systems

Creating Effective Quality Management Systems. Effective Quality Management Systems (QMS) are the products of proper implementation.  For ISO 9001:2015, that implementation is dependent on a detailed assessment of what processes are required for by the context of the organization.  That assessment can also provide guidance for requirements of  the management team that needs to be … Read more

CMMC Certification – We Can Help!

As a Cybersecurity and NIST Consultant, we are prepared to help Department of Defense (DoD) companies and contractors to develop their Cybersecurity Maturity Model Certification (CMMC) programs. The development of CMMC has been a concern for companies in the Defese Industrial Base (DIB) and many have voiced concerns that the CMMC was creating barriers to … Read more

Information Security Management System

What is an Information Security Management System (ISMS) An Information Security Management System is a collection of policies, procedures, and controls that systematically address information security in an organization.  It is a framework based on risk assessment and risk management.  The most widely recognized and instituted ISMS in the business environment is ISO 27001.  It … Read more

ITAR Part 127

The International Traffic in Arms Regulations ITAR Part 127 is available from the Government Printing Office (GPO) as an annual hardcopy or e-document publication as part of the Code of Federal Regulations (CFR) and as an updated e-document. Title 22 → Chapter I → Subchapter M → ITAR Part 127 Title 22: Foreign RelationsPART 127—VIOLATIONS … Read more

ITAR Part 120 – International Traffic in Arms Regulations

  The International Traffic in Arms Regulations ITAR Part 120 is available from the Government Printing Office (GPO) as an annual hardcopy or e-document publication as part of the Code of Federal Regulations (CFR) and as an updated e-document. CVG Strategy update 04/10/2023 The Department of State manages the International Traffic in Arms Regulations, Part … Read more

ISO 9001 Consulting
QMS Expertise

ISO 9001 Consulting CVG Strategy provides ISO 9001 Consulting services in support of this popular quality management standard.  ISO 9001 is a well known standard for quality management systems and it is designed to help organizations ensure that they meet the needs of customers and other stakeholders while meeting statutory and regulatory requirements related to … Read more