Is FedRAMP Mandatory?

Is FedRAMP mandatory?

FedRAMP is one of the most popular topics on our website and blogs. We get questions every day about the FedRAMP program from customers and partners alike.

Is FedRAMP really mandatory?

Yes, FedRAMP is mandatory for Federal Agency cloud deployments and service models at the low, moderate, and high-risk impact levels. According to the FedRAMP website, private cloud deployments intended for single organizations and implemented fully within federal facilities are the only exception. Additionally, Agencies must submit a quarterly report in PortfolioStat listing all existing cloud services that do not meet FedRAMP requirements with the appropriate rationale and proposed resolutions for achieving compliance.

Read More

The Coronavirus (COVID-19) meets Cyber Security

Real-word viruses and their online counterparts

Real-word viruses and their online counterparts

COVID-19 or the Coronavirus is changing life as we know it. From simple handshakes to finding toilet paper, life has changed tremendously over the past several weeks. Not only is this virus a physical threat, but it is also a threat to cyber-security. Different scams, phishing emails, fake news, and other online threats are spreading just as fast as the virus itself. Just as doctors say frequent hand-washing and respiratory hygiene is the best defense against the coronavirus, cybersecurity professionals stress that computer users need to be wary of what people clicking and downloading online.

Read More

Deploying Mobile Devices Securely For The SMB

Deploying Mobile Devices Securely For The SMB

Secure Mobile Device Deployments

As we all know, mobile devices have become not an integral part of the workplace, but even in society. Therefore, the safe deployment of these devices is of paramount importance not just for individuals, but businesses and corporations, government agencies, as well as other entities.

For example:

Mobile devices have indeed become an integral part of any corporate network, as many employees these days now login from their Smartphone to access shared files and other types of resources.
In fact, mobile devices have become the prime target for the Cyber attacker today. Thus, an understanding of the risks and threats that are out there and how to combat them in a proactive fashion is a must.

Read More