[{"id":218,"link":"https:\/\/quatronics.com\/usb-espionage-the-silent-threat\/","name":"usb-espionage-the-silent-threat","thumbnail":{"url":false,"alt":false},"title":"USB Espionage: The Silent Threat","excerpt":"","content":"It looks like a USB charging cable. And it is. But it\u2019s more. What looks like a simple charging cable can actually be an advanced","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 10, 2024","dateGMT":"2024-11-10 22:11:56","modifiedDate":"2024-11-10 22:11:56","modifiedDateGMT":"2024-11-10 22:11:56","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dataprotection\/' rel='post_tag'>#DataProtection<\/a><a href='https:\/\/quatronics.com\/tag\/insiderthreat\/' rel='post_tag'>#InsiderThreat<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":1,"sec":34},"status":"publish"},{"id":204,"link":"https:\/\/quatronics.com\/cmmc-compliance-beyond-the-template-a-personalized-approach\/","name":"cmmc-compliance-beyond-the-template-a-personalized-approach","thumbnail":{"url":false,"alt":false},"title":"CMMC Compliance: Beyond the Template - A Personalized Approach","excerpt":"","content":"For CMMC compliance, will DoD provide standardized templates for a System Security Plan (SSP) and Plan of Action and Milestones (POA&M)? No. The DoD does","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 1, 2024","dateGMT":"2024-11-01 19:23:47","modifiedDate":"2024-11-04 19:29:55","modifiedDateGMT":"2024-11-04 19:29:55","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dod\/' rel='post_tag'>#DoD<\/a><a href='https:\/\/quatronics.com\/tag\/poam\/' rel='post_tag'>#POAM<\/a><a href='https:\/\/quatronics.com\/tag\/ssp\/' rel='post_tag'>#SSP<\/a>"},"readTime":{"min":0,"sec":26},"status":"publish"},{"id":202,"link":"https:\/\/quatronics.com\/will-subcontractors-be-able-to-self-assess-their-compliance-with-cmmc-level-2-maybe\/","name":"will-subcontractors-be-able-to-self-assess-their-compliance-with-cmmc-level-2-maybe","thumbnail":{"url":false,"alt":false},"title":"Will Subcontractors Be Able to Self-Assess Their Compliance with CMMC Level 2? Maybe\u2026","excerpt":"","content":"Under the\u00a0CMMC program, prime contractors that are required to meet\u00a0Level 2 standards\u00a0for handling Controlled Unclassified Information (CUI) typically must obtain a\u00a0Final Level 2 (C3PAO) certification","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Oct 29, 2024","dateGMT":"2024-10-29 18:53:44","modifiedDate":"2024-11-04 19:23:32","modifiedDateGMT":"2024-11-04 19:23:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":34},"status":"publish"},{"id":168,"link":"https:\/\/quatronics.com\/definitive-media-library\/","name":"definitive-media-library","thumbnail":{"url":false,"alt":false},"title":"Definitive Media Library","excerpt":"","content":"Securely managing software and system configurations is a challenge. But software and system configuration management is critical to information security. This is where a Definitive","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 16, 2024","dateGMT":"2024-09-16 17:37:22","modifiedDate":"2024-09-17 17:56:30","modifiedDateGMT":"2024-09-17 17:56:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/baselineconfiguration\/' rel='post_tag'>#BaselineConfiguration<\/a><a href='https:\/\/quatronics.com\/tag\/changecontrol\/' rel='post_tag'>#ChangeControl<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/definitivemedialibrary\/' rel='post_tag'>#DefinitiveMediaLibrary<\/a><a href='https:\/\/quatronics.com\/tag\/itil\/' rel='post_tag'>#ITIL<\/a><a href='https:\/\/quatronics.com\/tag\/itmanagement\/' rel='post_tag'>#ITmanagement<\/a><a href='https:\/\/quatronics.com\/tag\/nist\/' rel='post_tag'>#NIST<\/a><a href='https:\/\/quatronics.com\/tag\/softwaresecurity\/' rel='post_tag'>#softwaresecurity<\/a>"},"readTime":{"min":1,"sec":46},"status":"publish"},{"id":165,"link":"https:\/\/quatronics.com\/unauthorized-vulnerability-scans\/","name":"unauthorized-vulnerability-scans","thumbnail":{"url":false,"alt":false},"title":"Unauthorized Vulnerability Scans","excerpt":"","content":"It\u2019s Friday afternoon at Quantum Naval Solutions. A network intrusion detection system has identified vulnerability scanning activity from an internal IP address. The activity stops,","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 15, 2024","dateGMT":"2024-09-15 15:41:15","modifiedDate":"2024-09-17 17:37:15","modifiedDateGMT":"2024-09-17 17:37:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/nist800171\/' rel='post_tag'>#NIST800171<\/a><a href='https:\/\/quatronics.com\/tag\/riskmanagement\/' rel='post_tag'>#RiskManagement<\/a>"},"readTime":{"min":1,"sec":46},"status":"publish"},{"id":163,"link":"https:\/\/quatronics.com\/rogue-wifi-plan-of-action\/","name":"rogue-wifi-plan-of-action","thumbnail":{"url":false,"alt":false},"title":"Rogue WiFi: Plan of Action","excerpt":"","content":"Your technical sales support person is the most knowledgeable person in your company about WiFi. She discovers that problems with connections may be caused by","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 12, 2024","dateGMT":"2024-09-12 03:07:22","modifiedDate":"2024-09-17 15:35:37","modifiedDateGMT":"2024-09-17 15:35:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":2,"sec":11},"status":"publish"},{"id":160,"link":"https:\/\/quatronics.com\/rogue-wifi-part-1rogue-wifi\/","name":"rogue-wifi-part-1rogue-wifi","thumbnail":{"url":false,"alt":false},"title":"Rogue WiFi - Part 1","excerpt":"","content":"Imagine this: Your team is suddenly experiencing flaky WiFi access. Users are getting connected, disconnected, reconnected\u2014sometimes multiple times this morning. When they\u2019re connected, everything seems","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 11, 2024","dateGMT":"2024-09-11 15:01:00","modifiedDate":"2024-09-15 03:06:29","modifiedDateGMT":"2024-09-15 03:06:29","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":0,"sec":33},"status":"publish"},{"id":158,"link":"https:\/\/quatronics.com\/post-incident-recovery\/","name":"post-incident-recovery","thumbnail":{"url":false,"alt":false},"title":"Post-Incident Recovery","excerpt":"","content":"Post-Incident Recovery is the final stage of a well-written Incident Response Plan. Once a security incident is fully resolved, the work shouldn\u2019t stop there. Post-incident","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 9, 2024","dateGMT":"2024-09-09 14:52:00","modifiedDate":"2024-09-15 02:58:31","modifiedDateGMT":"2024-09-15 02:58:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/businesscontinuity\/' rel='post_tag'>#BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/postincidentrecovery\/' rel='post_tag'>#PostIncidentRecovery<\/a>"},"readTime":{"min":1,"sec":27},"status":"publish"},{"id":150,"link":"https:\/\/quatronics.com\/recovery-in-the-incident-response-plan\/","name":"recovery-in-the-incident-response-plan","thumbnail":{"url":false,"alt":false},"title":"Recovery in the Incident Response Plan","excerpt":"","content":"Let\u2019s talk about Recovery from a cybersecurity incident. Recovery is the last part of the third phase of an effective Incident Response Plan. Recovery involves","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 5, 2024","dateGMT":"2024-09-05 18:08:21","modifiedDate":"2024-09-05 18:08:21","modifiedDateGMT":"2024-09-05 18:08:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/businesscontinuity\/' rel='post_tag'>#BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a>"},"readTime":{"min":1,"sec":9},"status":"publish"},{"id":148,"link":"https:\/\/quatronics.com\/eradication-in-the-incident-response-plan\/","name":"eradication-in-the-incident-response-plan","thumbnail":{"url":false,"alt":false},"title":"Eradication in the Incident Response Plan","excerpt":"","content":"Let\u2019s talk about Eradication. Eradication is a critical part of the third phase of an effective Incident Response Plan. It involves eliminating the root cause","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 4, 2024","dateGMT":"2024-09-04 17:38:08","modifiedDate":"2024-09-05 18:02:00","modifiedDateGMT":"2024-09-05 18:02:00","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity-incidentresponse-cmmc-dfars-infosec-businesscontinuity\/' rel='post_tag'>#Cybersecurity #IncidentResponse #CMMC #DFARS #Infosec #BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a>"},"readTime":{"min":1,"sec":32},"status":"publish"},{"id":142,"link":"https:\/\/quatronics.com\/strengthening-your-incident-response-with-effective-containment\/","name":"strengthening-your-incident-response-with-effective-containment","thumbnail":{"url":false,"alt":false},"title":"Strengthening Your Incident Response with Effective Containment","excerpt":"","content":"Containment, Eradication, and Recovery is the third element of an effective Incident Response Plan. Let\u2019s talk about Containment. The strategies you choose to contain an","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 3, 2024","dateGMT":"2024-09-03 20:48:43","modifiedDate":"2024-09-03 21:31:43","modifiedDateGMT":"2024-09-03 21:31:43","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":12},"status":"publish"},{"id":152,"link":"https:\/\/quatronics.com\/enhancing-your-incident-response-with-effective-detection-and-analysis\/","name":"enhancing-your-incident-response-with-effective-detection-and-analysis","thumbnail":{"url":false,"alt":false},"title":"Enhancing Your Incident Response with Effective Detection and Analysis","excerpt":"","content":"Detection and Analysis is the second phase of a robust Incident Response Plan. This phase is where the groundwork laid during preparation pays off. Imagine","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 3, 2024","dateGMT":"2024-09-03 18:20:42","modifiedDate":"2024-09-05 19:14:21","modifiedDateGMT":"2024-09-05 19:14:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/continuousimprovement\/' rel='post_tag'>#ContinuousImprovement<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a>"},"readTime":{"min":1,"sec":11},"status":"publish"}]