cybersecurity

Key Information About DFARS Regulations

By Heather Engel, Sera-Brynn, Executive Vice President  This article is the sixth in a series about DFARS. December 2017 seems like a long way off. It’s not. While that’s the deadline imposed by the Department of Defense (DoD) to comply with new contractor regulations regarding safeguarding information, we recommend considering the Gen. George Patton approach:… Read more »

DFARS 252.204-7012 to Safeguard Covered Defense Information

By Heather Engel, Sera-Brynn, Executive Vice President  This article is the fifth in a series. The protection of Covered Defense Information (CDI) that resides on or transits through contractor information systems is of paramount importance to the Department of Defense (DoD). Particularly in light of the stunning volume of cyber attacks on DoD networks. Over… Read more »

DFARS 252.204-7012, NIST 800-171 and Continuous Monitoring

By Heather Engel, Sera-Brynn, Executive Vice President  This article is the fourth in a series One of Sun Tzu’s more famous quotes from his book, “The Art of War,” is this: “The supreme art of war is to subdue the enemy without fighting.” Although the cagey, ancient Chinese general could not comprehend a future of… Read more »

Become DFARS Compliant Using the Sera-Brynn Method

By Heather Engel, Sera-Brynn, Executive Vice President This article is the second in a series. Cybersecurity requirements for Department of Defense (DoD) contractors and subcontractors are here and getting compliant under Defense Federal Acquisitions Regulations Supplement (DFARS) can feel daunting. It doesn’t have to be. In this second part of our blog series on DFARS,… Read more »

Navigating DFARS to ensure compliance and avoiding trouble

By Heather Engel, Sera-Brynn, Executive Vice President This article is the first in a series. In a world of high stakes security, it’s incumbent upon government contractors to comply with federal regulations. The largest buyer of goods and services in the world is the U.S. federal government, with the Department of Defense (DoD) contributing a… Read more »

Ransomware on the rise as businesses continue to pay

According to a recent article on ZDNet, Ransomware has surpassed Advanced Persistent Threats (APTs) “as the most problematic cyber threat.” Ransomware is a piece of malicious software (malware) that will encrypt files on a computer or multiple computers. This renders the files inaccessible unless a decryption key is available. Whether the victim organization is a… Read more »

Protect Your Email With 2-Step Verification

Whether you use Gmail, Yahoo or Microsoft email, they all offer a free service called “2-Step Verification” to help keep your account from being compromised by hackers. Hackers are compromising email accounts and it’s making headlines, like this article just this week: http://www.nbcnews.com/tech/security/hundreds-millions-email-accounts-hacked-traded-online-says-expert-n568491 If you’re not familiar with 2-Step Verification, don’t worry, you’re not alone…. Read more »

It’s World Password Day. So Do Something About It.

Here’s a riddle for you: You hate them but they are invaluable. They protect you until they don’t. You think you have too many of them. Do you have an answer? We’re talking about passwords, of course. Most people know today as “Cinco de Mayo.” We know it — seeing as how Cinco de Mayo… Read more »

Sera-Brynn awarded exclusive Cybersecurity Agreement with The National Catholic Risk Retention Group

Suffolk, Va., May 3, 2016 — Sera-Brynn has been awarded a contract by The National Catholic Risk Retention Group to provide specialized Risk Control cybersecurity products and services to its members, clients, affiliates and shareholders. Sera-Brynn is a global cybersecurity firm headquartered in Virginia and No. 16 in the world as ranked in the Cybersecurity… Read more »