[{"id":339,"link":"https:\/\/quatronics.com\/phone-fortress-how-to-keep-your-mobile-device-secure\/","name":"phone-fortress-how-to-keep-your-mobile-device-secure","thumbnail":{"url":false,"alt":false},"title":"Phone Fortress: How to Keep Your Mobile Device Secure","excerpt":"","content":"Our mobile phone system in the US is compromised.\u00a0 Government and cell phone companies have confirmed that. Here are my Key takeaways from the CISA","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Dec 25, 2024","dateGMT":"2024-12-25 10:45:52","modifiedDate":"2025-01-01 15:45:59","modifiedDateGMT":"2025-01-01 15:45:59","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/mobiledevices\/' rel='post_tag'>#MobileDevices<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":0,"sec":53},"status":"publish"},{"id":332,"link":"https:\/\/quatronics.com\/authenticator-security-a-closer-look-at-the-limitations\/","name":"authenticator-security-a-closer-look-at-the-limitations","thumbnail":{"url":false,"alt":false},"title":"Authenticator Security: A Closer Look at the Limitations","excerpt":"","content":"Many of us trust Google Authenticator to add a layer of security to our accounts. But, Google Authenticator has a serious security vulnerability which makes","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Dec 24, 2024","dateGMT":"2024-12-24 23:11:44","modifiedDate":"2024-12-26 23:24:39","modifiedDateGMT":"2024-12-26 23:24:39","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":1,"sec":26},"status":"publish"},{"id":330,"link":"https:\/\/quatronics.com\/act-now-protect-your-phone-from-the-latest-threats\/","name":"act-now-protect-your-phone-from-the-latest-threats","thumbnail":{"url":false,"alt":false},"title":"Act Now: Protect Your Phone From the Latest Threats","excerpt":"","content":"Our mobile phone system in the US is compromised. Government and cell phone companies have confirmed that. Here are my Key Takeaways from the CISA","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Dec 20, 2024","dateGMT":"2024-12-20 23:07:53","modifiedDate":"2024-12-26 23:10:26","modifiedDateGMT":"2024-12-26 23:10:26","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":0,"sec":52},"status":"publish"},{"id":141,"link":"https:\/\/quatronics.com\/navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-3\/","name":"navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-3","thumbnail":{"url":false,"alt":false},"title":"Navigating the Intersection of Post-Quantum Encryption and CMMC Compliance","excerpt":"","content":"This week's release of the first three post-quantum encryption standards by NIST\u2014FIPS 203, 204, and 205\u2014marks a significant step in securing data against the threat","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Dec 18, 2024","dateGMT":"2024-12-18 03:55:14","modifiedDate":"2024-12-18 03:55:15","modifiedDateGMT":"2024-12-18 03:55:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":3},"status":"publish"},{"id":316,"link":"https:\/\/quatronics.com\/bluetooth-and-cui-a-recipe-for-disaster\/","name":"bluetooth-and-cui-a-recipe-for-disaster","thumbnail":{"url":false,"alt":false},"title":"Bluetooth and CUI - A Recipe for Disaster","excerpt":"","content":"Bluetooth should be avoided on systems doing any kind of work for the Federal government - DoD or civilian. When tightening security for system access,","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Dec 3, 2024","dateGMT":"2024-12-03 18:29:41","modifiedDate":"2024-12-19 18:33:54","modifiedDateGMT":"2024-12-19 18:33:54","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a>, <a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a> <a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a><a href='https:\/\/quatronics.com\/tag\/incidentprevention\/' rel='post_tag'>#IncidentPrevention<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":1,"sec":2},"status":"publish"},{"id":314,"link":"https:\/\/quatronics.com\/is-your-office-bugged-maybe-not-butyour-friendly-neighborhood-spy\/","name":"is-your-office-bugged-maybe-not-butyour-friendly-neighborhood-spy","thumbnail":{"url":false,"alt":false},"title":"Is Your Office Bugged? Maybe Not, But\u2026Your Friendly Neighborhood Spy","excerpt":"","content":"You might think sophisticated hackers need to crack complex codes or plant hidden devices to steal your company's secrets. But the truth is, sometimes the","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 29, 2024","dateGMT":"2024-11-29 18:00:34","modifiedDate":"2024-12-19 18:21:36","modifiedDateGMT":"2024-12-19 18:21:36","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":1,"sec":33},"status":"publish"},{"id":218,"link":"https:\/\/quatronics.com\/usb-espionage-the-silent-threat\/","name":"usb-espionage-the-silent-threat","thumbnail":{"url":false,"alt":false},"title":"USB Espionage: The Silent Threat","excerpt":"","content":"It looks like a USB charging cable. And it is. But it\u2019s more. What looks like a simple charging cable can actually be an advanced","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 10, 2024","dateGMT":"2024-11-10 22:11:56","modifiedDate":"2024-12-18 20:47:48","modifiedDateGMT":"2024-12-18 20:47:48","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dataprotection\/' rel='post_tag'>#DataProtection<\/a><a href='https:\/\/quatronics.com\/tag\/insiderthreat\/' rel='post_tag'>#InsiderThreat<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":1,"sec":34},"status":"publish"},{"id":306,"link":"https:\/\/quatronics.com\/306-2\/","name":"306-2","thumbnail":{"url":false,"alt":false},"title":"Certification Validity","excerpt":"","content":"Are CMMC certificates really valid for three years? Yes. But... Once the CMMC program is implemented (December 16, 2024), C3PAOs will be able to issue","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 4, 2024","dateGMT":"2024-11-04 20:53:15","modifiedDate":"2024-12-19 18:00:18","modifiedDateGMT":"2024-12-19 18:00:18","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc-cybersecurity-compliance-dod-ssp-poam\/' rel='post_tag'>#CMMC #Cybersecurity #Compliance #DoD #SSP #POAM<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/informationsecurity\/' rel='post_tag'>#InformationSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a>"},"readTime":{"min":0,"sec":47},"status":"publish"},{"id":304,"link":"https:\/\/quatronics.com\/plan-of-action-templates\/","name":"plan-of-action-templates","thumbnail":{"url":false,"alt":false},"title":"Plan of Action Templates","excerpt":"","content":"For CMMC compliance, will DoD provide standardized templates for a System Security Plan (SSP) and Plan of Action and Milestones (POA&M)? No. The DoD does","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 4, 2024","dateGMT":"2024-11-04 20:50:19","modifiedDate":"2024-12-18 20:53:08","modifiedDateGMT":"2024-12-18 20:53:08","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/incidence-response-plan\/\" rel=\"category tag\">incidence response plan<\/a>, <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/incidence-response-plan\/\" rel=\"category tag\">incidence response plan<\/a> <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dod\/' rel='post_tag'>#DoD<\/a><a href='https:\/\/quatronics.com\/tag\/poam\/' rel='post_tag'>#POAM<\/a><a href='https:\/\/quatronics.com\/tag\/ssp\/' rel='post_tag'>#SSP<\/a>"},"readTime":{"min":0,"sec":26},"status":"publish"},{"id":204,"link":"https:\/\/quatronics.com\/cmmc-compliance-beyond-the-template-a-personalized-approach\/","name":"cmmc-compliance-beyond-the-template-a-personalized-approach","thumbnail":{"url":false,"alt":false},"title":"CMMC Compliance: Beyond the Template - A Personalized Approach","excerpt":"","content":"For CMMC compliance, will DoD provide standardized templates for a System Security Plan (SSP) and Plan of Action and Milestones (POA&M)? No. The DoD does","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Nov 1, 2024","dateGMT":"2024-11-01 19:23:47","modifiedDate":"2024-11-04 19:29:55","modifiedDateGMT":"2024-11-04 19:29:55","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dod\/' rel='post_tag'>#DoD<\/a><a href='https:\/\/quatronics.com\/tag\/poam\/' rel='post_tag'>#POAM<\/a><a href='https:\/\/quatronics.com\/tag\/ssp\/' rel='post_tag'>#SSP<\/a>"},"readTime":{"min":0,"sec":26},"status":"publish"},{"id":202,"link":"https:\/\/quatronics.com\/will-subcontractors-be-able-to-self-assess-their-compliance-with-cmmc-level-2-maybe\/","name":"will-subcontractors-be-able-to-self-assess-their-compliance-with-cmmc-level-2-maybe","thumbnail":{"url":false,"alt":false},"title":"Will Subcontractors Be Able to Self-Assess Their Compliance with CMMC Level 2? Maybe\u2026","excerpt":"","content":"Under the\u00a0CMMC program, prime contractors that are required to meet\u00a0Level 2 standards\u00a0for handling Controlled Unclassified Information (CUI) typically must obtain a\u00a0Final Level 2 (C3PAO) certification","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Oct 29, 2024","dateGMT":"2024-10-29 18:53:44","modifiedDate":"2024-11-04 19:23:32","modifiedDateGMT":"2024-11-04 19:23:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":34},"status":"publish"},{"id":168,"link":"https:\/\/quatronics.com\/definitive-media-library\/","name":"definitive-media-library","thumbnail":{"url":false,"alt":false},"title":"Definitive Media Library","excerpt":"","content":"Securely managing software and system configurations is a challenge. But software and system configuration management is critical to information security. This is where a Definitive","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 16, 2024","dateGMT":"2024-09-16 17:37:22","modifiedDate":"2024-09-17 17:56:30","modifiedDateGMT":"2024-09-17 17:56:30","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/baselineconfiguration\/' rel='post_tag'>#BaselineConfiguration<\/a><a href='https:\/\/quatronics.com\/tag\/changecontrol\/' rel='post_tag'>#ChangeControl<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/definitivemedialibrary\/' rel='post_tag'>#DefinitiveMediaLibrary<\/a><a href='https:\/\/quatronics.com\/tag\/itil\/' rel='post_tag'>#ITIL<\/a><a href='https:\/\/quatronics.com\/tag\/itmanagement\/' rel='post_tag'>#ITmanagement<\/a><a href='https:\/\/quatronics.com\/tag\/nist\/' rel='post_tag'>#NIST<\/a><a href='https:\/\/quatronics.com\/tag\/softwaresecurity\/' rel='post_tag'>#softwaresecurity<\/a>"},"readTime":{"min":1,"sec":46},"status":"publish"}]