How to Receive Funding for DoD Cybersecurity Compliance

How to Receive Funding for DoD Cybersecurity Compliance

The DoD Cybersecurity Compliance is the Cybersecurity Maturity Model Certification (CMMC 2.0).

What is this?

The CMMC program is aligned to DoD’s information security requirements for Defense Industrial Base partners (those of whom create products or services that allow for the sustainability or deployment of military operations).

Why’s it important?

Michigan Cyber Defense is created a CyberSmart program that provides $22,500 to small to medium-sized businesses to help obtain the CMMC 2.0.

My company sells products or services for the military… How do I get $22,500 for CMMC 2.0?

Talk to us – we’re a pre-approved CyberSmart resource for the state of Michigan. 

We conduct your gap analysis and can assist in writing your System Security Plan and Plan of Actions and Milestones. Moreover, we can help you become certified. 

How do I know if I need the CMMC 2.0 Compliance?

If you create products or services for the military, you need the compliance. If you create products or services for another company that works with the military, you’re going to need the compliance. 

Many times, we say that if you’re ITAR certified, you’re going to need the CMMC 2.0 certification. 

What if I do nothing?

After 2025, you will no longer be eligible to sell products directly or indirectly (prime or subcontractor) to the DoD or Aerospace industries. 

How long is the State of Michigan providing grant funds for becoming CMMC 2.0 certified?

Until October 2023, but we recommend getting started right away.

What’s Cybersecurity Insurance?

What’s Cybersecurity Insurance?

Cybersecurity insurance is a new, emerging industry. Companies that purchase cybersecurity insurance today are considered early adopters. 

Cyber insurance policies help cover the financial losses that result from cyber events and incidents. In addition, cyber-risk coverage helps with the costs associated with remediation. It also includes payments for the legal assistance, investigators, crisis communicators, and customer credits or refunds. 

More or less, it insures potential losses due to cyber attacks.

Do I need cyber insurance?

Any business that creates, stores, and manages electronic data online can benefit from cyber insurance. Some examples include: customer contracts or credit card numbers.

That means, using Google Drive, online servers, or performing transactional data between businesses can be helped/benefitted from cyber insurance. 

What does it cover?

• meeting extortion demands from a ransomware attack
• notifying customers when a security breach has occurred
• paying legal fees levied as a result of privacy violations
• hiring experts to recover compromised data
• restoring identities of customers whose personal identifiable information was compromised
• recovering data that has been altered or stolen
• repairing or replacing damaged or compromised computers systems

What it doesn’t cover?

• cyber events initiated and caused by employees or insiders
• failure to correct a known vulnerability, such as a company that knows that a vulnerability exists, fails to address it and is then compromised from that vulnerability
• the cost to improve technology systems, including security hardening in systems or applications

What are my next steps?

First of all, contact us to get started. From there, we’ll show you how to remain safe and proactive from any cyber attack. 

The Top 6 Reasons Why You Should Update Your Office Phones

The Top 6 Reasons Why You Should Update Your Office Phones

Has it been a while since you’ve taken a hard look at your office phones? We understand, it’s not an everday thing…

We expect so much out of our communication tools… and when they don’t work, it’s a hassle.

If you’ve been in a situation where it’s hard to reach a customer or coworker – don’t worry, we’ve got you covered. Here are the top 6 reasons why you should update your office phones with us:

1. USE FIND ME / FOLLOW ME

It’s a feature that’s extremely beneficial to you when you’re away from your desk. Essentially, you use one phone to answer your personal and work calls. The best part? When you call a client, they see your work number. 

2. AUTO ATTENDANT

Route calls to different departments or voicemail boxes via interactive menus. While this seems common, it’s actually quite not. The feature itself screams modern day small business because we’re all limited on time, so why not help everyone communicate a little easier?

3. VOICEMAIL TO EMAIL

Again, it seems like a common concept, but most small-to-medium sized businesses don’t have this feature.

If you miss an important call from a client, you don’t want your work phone voicemail to not accept because your inbox is full (trust us, it happens more than you think).

Get a copy of the voicemail directly to your email and ensure you connect back. Seems too good to be true.

4. RING GROUPS

Do you want someone always answering your office phones? With ring groups, you can. Some of our clients use this feature because they have multiple locations that need to assist a regional area, and they want to ensure the best customer experience

5. SOFTPHONE

Use your computer (i.e. VOIP) to make calls. No need to grab your cell phone out of your pocket when you’re in the office working productively… Use your computer!

6. TEXT VIA A WORK NUMBER

Use your personal cell phone as an “all-in-one” solution for customer service. Text your clients as requested/needed.

NEXT STEPS

Contact us about new office phones for your business – we’ll take care of you!

3 Benefits of New Hardware You Can’t Afford To Ignore

3 Benefits of New Hardware You Can’t Afford To Ignore

If you haven’t purchased new hardware for your office, you’re missing out. New computers and/or laptops are game changers for patch updates, new software, and so much more. 

Let’s talk about the benefits of new hardware. 

1. FEWER SECURITY RISKS

When your computers, phones, etc. age, their support and warranties become nonexistent. Devices eventually have an end of life which means manufacturers and developers no longer issue updates.

Software updates also provide new features, smoother experiences, and bug fixes that earlier versions may have not gotten rid of. The most critical piece; however, is security patches. If these are left unfinished, they leave you vulnerable. 

2. YOU WORK FASTER

There’s no better feeling than coming into work, firing up your computer, and being able to open all applications without issues. New hardware not only makes this possible, it guarantees increased business efficiency and staff productivity. 

3. INCREASE EMPLOYEE MORALE

There’s nothing more important than increasing and maintaining employees happiness. We get it, new hardware costs money, but look at the brighter side… it:

  • improves customer service or supplier relationships
  • develops more effective communication within the business or with consumers
  • expands your business offer or reaches new markets
  • develops a competitive advantage by implementing the right technologies, those of which that use faster processing

NEXT STEPS

Contact us about new hardware for your business – we’ll take care of you!

5 Tips to Guard Against Smishing Attacks on Your Phone

5 Tips to Guard Against Smishing Attacks on Your Phone

Smishing, or SMS phishing, is a fast-growing type of mobile fraud that uses text messages to try and scam you out of your personal information. Criminals send phony texts purporting to be from a legitimate source, like your bank or credit card company, to get you to reveal confidential information like your account number or password.

Here are five tips to help you guard against smishing attacks:

1. VISIT THE ORGANIZATION’S WEBSITE DIRECTLY

If you receive a text message that looks like it’s from your bank, for example, don’t click on any links in the message. Instead, go to your bank’s website directly and log in to your account from there. That way, you can be sure you’re not being redirected to a fake website designed to steal your information.

2. NEVER GIVE OUT SENSITIVE PERSONAL INFORMATION VIA TEXT MESSAGE

The best way to avoid being scammed by a text message is not to give out any sensitive personal information via text. This includes your account number, password, Social Security number, or date of birth.

If you receive a text message that asks for this type of information, don’t reply and don’t click on any links in the message. Report the text to your cell phone carrier or anti-fraud organization immediately.

3. NEVER CLICK ON UNKNOWN LINKS

The best way to avoid being scammed by a text message is not to give out any sensitive personal information via text. This includes your account number, password, Social Security number, or date of birth.

If you receive a text message that asks for this type of information, don’t reply and don’t click on any links in the message. Report the text to your cell phone carrier or anti-fraud organization immediately.

4. CALL THE ORGANIZATION ON THEIR OFFICIAL PHONE NUMBER

If you’re still not sure whether or not a text message is legitimate, one way to check is to call the organization that supposedly sent it on their official phone number.

For example, if you receive a text that looks like it’s from your bank, you can find their customer service number on their website and give them a call to verify the message.

5. KEEP YOUR DEVICES PROTECTED

Ensure your devices are protected with strong passwords and up-to-date security software to help guard against smishing attacks and other types of mobile fraud.

NEXT STEPS

Contact us for more information about how to keep your devices safe.