Iranian Cybersecurity Threats Continue Worldwide

iranian cybersecurity threats

The Truth About Iranian Cybersecurity Threats Given recent headlines, one might conclude that Iranian Cybersecurity threats were a new development.  In fact, Iran has been a player in the international cyber game since 2002 with the formation of the Ashiyane hacking forum to repress dissidents.  By 2007, government backed organizations had begun to develop sophisticated … Read more

Quantum-Resistant Cryptographic Algorithms NIST

Quantum-Resistant Cryptographic Algorithms

The National Institute of Standards and Technology (NIST) announced that they had selected four Quantum-Resistant Cryptographic Algorithms to address concerns of quantum computer cyber attacks against current encryption technologies.  The selection was made from respondents to a post-quantum cryptography standardization project. The Emerging World of Quantum Computing Quantum computers utilize certain phenomena of quantum mechanics … Read more

CMMC Consultants – Assessment and Preparation

CMMC 2.0 Compliance CVG Strategy CMMC Consultants CVG Strategy CMMC consultants can prepare your organization for Cybersecurity Maturity Model Certification (CMMC) 2.0.  We specialize in performing assessments of information assets and data flows to ensure that proper application of NIST SP 800-171 security controls are in place.  This process includes performance of a Gap Analysis, … Read more

NIST Cybersecurity for Business Applications

nist cybersecurity for business

Integrating NIST cybersecurity for business applications into existing management system processes requires specialized implementation.  This is of special concern for organizations involved in contracting with the Department of Defense (DoD) that are adopting NIST SP 800-171 to meet Cybersecurity Maturity Model Certification (CMMC) requirements.   A major issue in this integration, is that the NIST cybersecurity … Read more

Challenges in Adopting CMMC Standards

challenges in adopting CMMC standards

Many small businesses owners have expressed concerns about the challenges in adopting CMMC standards.  While the Department of Defense (DoD) has been stressing the necessity for contractors to reach various levels of Cybersecurity Maturity Model Certification (CMMC) for years now, many businesses are at a loss as to how to implement an effective program despite … Read more

Medical Equipment EMC Requirements from the FDA

Medical Equipment EMC Susceptibility

The Food and Drug Administration (FDA) has completed guidance for medical equipment Electromagnetic Compatibility (EMC) information to be submitted before an electrical medical device that is manufactured in the United States is marketed.  This guidance updates previous submission recommendations released in 2016.  Its intent is to provide clarification of what the FDA will consider in … Read more

Messaging App Security and Information Privacy

messaging app security

Many users take messaging app security for granted when sending text messages, voice messages, photos, and videos.  However, not all apps secure messaging data equally.  This is a concern for both organizations and individuals who wish to ensure the confidentiality, integrity, and authenticity of information transferred between authorized users. Elements of Messaging Security Messaging app … Read more

Infrastructure and Manufacturing Cyberattacks Continue

Infrastructure and Manufacturing Cyberattacks

Infrastructure and the manufacturing sector concerns pose tempting targets for cyberattacks.  Widespread effects that can harm vast sectors of society can occur when these systems are compromised. When considering Cyber Security first thoughts usually go to computers and information technology, but industrial devices and processes can fall victims as well.  On May of 2021 the … Read more

Cybersecurity Maturity Model Certification (CMMC)

cybersecurity maturity model certification

What is Cybersecurity Maturity Model Certification? The Office of the Under Secretary of Defense for Acquisition & Sustainment has released the Cybersecurity Maturity Model Certification program.  The program will be made effective in new programs released by the Department of Defense (DoD) and will be a requirement for product and service providers.  This program has … Read more

Cybersecurity Threats Trending Methods for 2021

Cybersecurity threats trending methods

Cybersecurity Threats by Industry Sector Cybersecurity threats remain a significant concern for organizations in every sector.  IBM’s 17th Cost of a Data Breach Report provided insights in to the nature of the threat environment in 2021.  This report provides an assessment of risks and strategies for protecting data and responses to data breaches. Among its … Read more

Cyber Security Consulting
and Training

Our Cyber Security consulting and training programs give you the necessary knowledge to ensure that safeguards are consistently applied to protect your sensitive data. System Review CVG Strategy can review your organization’s security infrastructure and process controls against the framework specified in ISO 27001 and NIST 800-171.  These reviews assess three critical categories  of existing … Read more

ISO 27001 Prevents Cyberattacks – ISMS for Data Security

ISO 27001 Prevents Cyberattacks

ISO 27001 Prevents Cyberattacks Implementing an ISO 27001 Information Security Management System (ISMS) prevents cyberattacks.  The Ponemon Institute in a 2017 study found that a typical firm experiences 130 security breaches each year.  Mitigating these breaches requires more than advanced IT practices, it requires a dedicated management system.  ISO/IEC 27001 is such a system.  It … Read more

Spyware a Growing Concern for Businesses

spyware a growing concern for businesses

According to a number of leaders in cybersecurity, spyware is becoming an issue of growing concern for businesses.  Malwarebytes, in its 2021 report, Malwarebytes 2021 State of Malware Report, observed that business spyware detections increased 51% in 2020.  These spyware infections can be found on both computers and mobile devices. What is Spyware? Spyware is … Read more

Technical Data and Export Law – Canada and the U.S.

technical data and export law

Technical Data and Export Law Understanding what technical data is and how it pertains to export law is important for companies doing business in the U.S. and Canada.  Both countries have different requirements and regulations controlling how technical data is stored and transferred.  Additionally, these regulations are subject to change. What is Technical Data? Definitions … Read more

International Trends in Cybercrime 2021

international trends in cybercrime

International trends in cybercrime show an increasing sophistication by both organized crime and hostile nation states.  These cybercriminals are continuing their efforts against high-value targets that include the industrial, IT, and infrastructure sectors.  This activity is occurring at a time when many organizations are struggling to develop integrated cybersecurity solutions. Cybercrime Exploitation of Uncertainty Cybercrime … Read more

DoD Contractor CMMC Requirements
Consultants

DoD Contractor CMMC Requirements are Mandatory for Primary Contractors and Subcontractors Department of Defense (DoD) contractor CMMC requirements have been in development since 2015 in an on going effort to safeguard Controlled Unclassified Information (CUI).   In 2020 the Defense Acquisition Federal Regulation Supplement (DFARS), mandated that private DoD Contractors adopt cybersecurity standards according to the … Read more