Last week, we discussed how to configure your organizational sharing settings to allow external collaborators on SharePoint and OneDrive documents. Up until now, if you wanted any kind of security or authentication of who you were sharing your documents with, the recipient needed to have either a Microsoft account or an Office 365 account from a different organization.
Office 365 is a great way to collaborate with your colleagues on documents no matter where you are. And its granular security settings mean that you can trust it with a wide range of sensitive data.
But those security settings can make it difficult to share documents with outside users, such as vendors, consultants, and contractors.
We developed a comprehensive overview of the NIST 800-171 security controls that are expected to be the cornerstone of CMMC regulations.
Many small- and medium-sized businesses are anxious about when the new rules will be put into place. Additionally, you may be wondering what you can do now to prepare for the eventual rollout of CMMC and the new contract requirements that will stem from it.
The COVID-19 pandemic has sent businesses scrambling to support their newly mobile workforce. For many of these businesses, this means they’re turning to cloud-based SaaS providers for collaboration, online meetings, and document sharing.
Unfortunately, this rush has meant that security problems have cropped up one after another.
As the COVID-19 outbreak spreads and “social distancing” becomes a household phrase, many companies are organizing an unprecedented shift toward working from home. So this week’s Tech Thursday article will focus on how your company can provide the resources your employees need to stay productive during these events.
With millions of people under orders or recommendations to stay at home due to COVID-19, work-from-home has been a hot topic recently. Enabling your users to work remotely will help keep them and others safe while still keeping your business going.
For the last few weeks, we’ve been examining the data protection guidelines that the IRS has laid out for tax preparers in IRS Publication 4557. First, we examined how tax preparers can comply with the Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA). Then we looked at some of the digital safeguards that tax professionals need to put in place to protect their computers and systems from hackers.
Along with tax season comes an increase in taxpayer data theft and associated fraud. So, the IRS has issued Publication 4557 to help tax preparation professionals safeguard the data that has been entrusted to them.
Last week, we looked at the Safeguards Rule of the Gramm-Leach-Bliley Act (GLBA) and why tax preparers need a written data security plan.
Tax season is upon us. For some of us, that means a nice refund, while for others, it means it’s time to settle up with Uncle Sam. But, unfortunately there’s one group who will be looking for a big payday this tax season: Tax refund scammers and identity thieves.
For our final installment of the “DFARS In Depth” series, we’ll cover the last of the fourteen security requirement families in NIST SP 800-171 -- System and Information Integrity.
While you may have spent fantastic amounts of time and energy securing your systems, the requirements in this family remind us that security is an ongoing process, which requires constant monitoring and adjustment.