Filter by
Guides
|
CMMC 2.0 Compliance Explained
Learn how the DoD supply chain will communicate and verify cyber security stature, what CMMC 2.0 means for Southern Cali...
Read More
Blog
|
5 Min Read
How Poor Network Infrastructure Jeopardizes Patients at Elderly Care Organi...
Elderly care facilities face a unique set of challenges when it comes to information technology. IT support problems in ...
Read More
Blog
|
5 Min Read
Before Busy Season: What CPA Firms Need to Do Now to Ensure FTC Compliance
Before busy season overwhelms your firm, now is the time to make sure you’ve got your cybersecurity in shape by reviewin...
Read More
Blog
|
3 Min Read
[Video] VC3 Answers Your FTC Safeguards Rule Questions
Cole Two Bears, VC3’s Director of Managed Security, recently discussed some of the most frequently asked questions from ...
Read More
Blog
|
3 Min Read
Continuous Cybersecurity Monitoring vs Penetration Testing for FTC Safeguar...
3 reasons why you’ll want continuous monitoring (vs. penetration testing alone) as your primary method of meeting the FT...
Read More
Blog
|
3 Min Read
3 Unexpected Ways the Updated FTC Safeguards Rule Will Trip Up CPA Firms
The updated FTC Safeguards Rule now includes specific requirements that a CPA firm’s information security plan must con...
Read More