by Ajeet | Feb 6, 2022 | Uncategorized
While there is still some time to get onboard and prepare for the CMMC certification, the government released an interim requirement that becomes effective November 30th 2020. nSee...
by Ajeet | Feb 6, 2022 | Uncategorized
Introduction to Privacy Compliance and Data Compliance Many MSPs are looking at becoming vCIOs for their customers. The main difference between the vCIO and the Network Admin is that the admin looks at network health, while the vCIO always analyzes the business...
by Ajeet | Feb 6, 2022 | Uncategorized
Stop building more walls and locks, and start focusing on the data first Most of the security and compliance tools that are prevalent in the MSP marketplace focus on addressing network and endpoint exploits. AV, EDR, VA, IPS, DPI, etc. all focus on exploits. But...
by Ajeet | Feb 6, 2022 | Uncategorized
Zero Trust isn’t as new concept in the enterprise space. It was conceptualized in the mid-2000’s, tried by Google (which experience code theft at the time) in the “BeyondCorp” architecture, and subsequently codified by Forrester’s John Kindervag in 2010 (see:...
by Ajeet | Feb 6, 2022 | Uncategorized
MSPs leverage cybersecurity tool stacks (or integrated platforms) to address their customers threat landscape (viruses, malware, ransomware, vulnerabilities and exploits) and to help ensure that continuity and disaster recovery are fully addressed. The best stacks...