[{"id":160,"link":"https:\/\/quatronics.com\/rogue-wifi-part-1rogue-wifi\/","name":"rogue-wifi-part-1rogue-wifi","thumbnail":{"url":false,"alt":false},"title":"Rogue WiFi - Part 1","excerpt":"","content":"Imagine this: Your team is suddenly experiencing flaky WiFi access. Users are getting connected, disconnected, reconnected\u2014sometimes multiple times this morning. When they\u2019re connected, everything seems","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 11, 2024","dateGMT":"2024-09-11 15:01:00","modifiedDate":"2024-09-15 03:06:29","modifiedDateGMT":"2024-09-15 03:06:29","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/networksecurity\/' rel='post_tag'>#NetworkSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/wirelesssecurity\/' rel='post_tag'>#WirelessSecurity<\/a>"},"readTime":{"min":0,"sec":33},"status":"publish"},{"id":158,"link":"https:\/\/quatronics.com\/post-incident-recovery\/","name":"post-incident-recovery","thumbnail":{"url":false,"alt":false},"title":"Post-Incident Recovery","excerpt":"","content":"Post-Incident Recovery is the final stage of a well-written Incident Response Plan. Once a security incident is fully resolved, the work shouldn\u2019t stop there. Post-incident","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 9, 2024","dateGMT":"2024-09-09 14:52:00","modifiedDate":"2024-09-15 02:58:31","modifiedDateGMT":"2024-09-15 02:58:31","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/businesscontinuity\/' rel='post_tag'>#BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/postincidentrecovery\/' rel='post_tag'>#PostIncidentRecovery<\/a>"},"readTime":{"min":1,"sec":27},"status":"publish"},{"id":150,"link":"https:\/\/quatronics.com\/recovery-in-the-incident-response-plan\/","name":"recovery-in-the-incident-response-plan","thumbnail":{"url":false,"alt":false},"title":"Recovery in the Incident Response Plan","excerpt":"","content":"Let\u2019s talk about Recovery from a cybersecurity incident. Recovery is the last part of the third phase of an effective Incident Response Plan. Recovery involves","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 5, 2024","dateGMT":"2024-09-05 18:08:21","modifiedDate":"2024-09-05 18:08:21","modifiedDateGMT":"2024-09-05 18:08:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/businesscontinuity\/' rel='post_tag'>#BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a>"},"readTime":{"min":1,"sec":9},"status":"publish"},{"id":148,"link":"https:\/\/quatronics.com\/eradication-in-the-incident-response-plan\/","name":"eradication-in-the-incident-response-plan","thumbnail":{"url":false,"alt":false},"title":"Eradication in the Incident Response Plan","excerpt":"","content":"Let\u2019s talk about Eradication. Eradication is a critical part of the third phase of an effective Incident Response Plan. It involves eliminating the root cause","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 4, 2024","dateGMT":"2024-09-04 17:38:08","modifiedDate":"2024-09-05 18:02:00","modifiedDateGMT":"2024-09-05 18:02:00","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity-incidentresponse-cmmc-dfars-infosec-businesscontinuity\/' rel='post_tag'>#Cybersecurity #IncidentResponse #CMMC #DFARS #Infosec #BusinessContinuity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a>"},"readTime":{"min":1,"sec":32},"status":"publish"},{"id":142,"link":"https:\/\/quatronics.com\/strengthening-your-incident-response-with-effective-containment\/","name":"strengthening-your-incident-response-with-effective-containment","thumbnail":{"url":false,"alt":false},"title":"Strengthening Your Incident Response with Effective Containment","excerpt":"","content":"Containment, Eradication, and Recovery is the third element of an effective Incident Response Plan. Let\u2019s talk about Containment. The strategies you choose to contain an","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 3, 2024","dateGMT":"2024-09-03 20:48:43","modifiedDate":"2024-09-03 21:31:43","modifiedDateGMT":"2024-09-03 21:31:43","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":12},"status":"publish"},{"id":152,"link":"https:\/\/quatronics.com\/enhancing-your-incident-response-with-effective-detection-and-analysis\/","name":"enhancing-your-incident-response-with-effective-detection-and-analysis","thumbnail":{"url":false,"alt":false},"title":"Enhancing Your Incident Response with Effective Detection and Analysis","excerpt":"","content":"Detection and Analysis is the second phase of a robust Incident Response Plan. This phase is where the groundwork laid during preparation pays off. Imagine","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Sep 3, 2024","dateGMT":"2024-09-03 18:20:42","modifiedDate":"2024-09-05 19:14:21","modifiedDateGMT":"2024-09-05 19:14:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/continuousimprovement\/' rel='post_tag'>#ContinuousImprovement<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dfars\/' rel='post_tag'>#DFARS<\/a><a href='https:\/\/quatronics.com\/tag\/incidentresponse\/' rel='post_tag'>#IncidentResponse<\/a><a href='https:\/\/quatronics.com\/tag\/infosec\/' rel='post_tag'>#Infosec<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a>"},"readTime":{"min":1,"sec":11},"status":"publish"},{"id":133,"link":"https:\/\/quatronics.com\/building-a-strong-cmmc-partnership-the-power-of-the-shared-responsibility-matrix\/","name":"building-a-strong-cmmc-partnership-the-power-of-the-shared-responsibility-matrix","thumbnail":{"url":false,"alt":false},"title":"Building a Strong CMMC Partnership: The Power of the Shared Responsibility Matrix","excerpt":"","content":"A Shared Responsibility Matrix is a simple but powerful tool. It clearly shows who is responsible for what in a partnership between a customer and","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 19, 2024","dateGMT":"2024-08-19 17:09:13","modifiedDate":"2024-08-19 17:09:13","modifiedDateGMT":"2024-08-19 17:09:13","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":52},"status":"publish"},{"id":139,"link":"https:\/\/quatronics.com\/cmmc-compliance-building-a-strong-partnership-with-shared-responsibilities\/","name":"cmmc-compliance-building-a-strong-partnership-with-shared-responsibilities","thumbnail":{"url":false,"alt":false},"title":"CMMC Compliance: Building a Strong Partnership with Shared Responsibilities","excerpt":"","content":"A Shared Responsibility Matrix is a simple but powerful tool. It clearly shows who is responsible for what in a partnership between a customer and","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 18, 2024","dateGMT":"2024-08-18 16:27:43","modifiedDate":"2024-08-29 16:28:18","modifiedDateGMT":"2024-08-29 16:28:18","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":52},"status":"publish"},{"id":156,"link":"https:\/\/quatronics.com\/navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-2\/","name":"navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance-2","thumbnail":{"url":false,"alt":false},"title":"Navigating the Intersection of Post-Quantum Encryption and CMMC Compliance","excerpt":"","content":"This week's release of the first three post-quantum encryption standards by NIST\u2014FIPS 203, 204, and 205\u2014 marks a significant step in securing data against the","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 15, 2024","dateGMT":"2024-08-15 22:51:52","modifiedDate":"2024-09-15 02:52:03","modifiedDateGMT":"2024-09-15 02:52:03","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a>"},"readTime":{"min":2,"sec":4},"status":"publish"},{"id":126,"link":"https:\/\/quatronics.com\/navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance\/","name":"navigating-the-intersection-of-post-quantum-encryption-and-cmmc-compliance","thumbnail":{"url":false,"alt":false},"title":"Navigating the Intersection of Post-Quantum Encryption and CMMC Compliance","excerpt":"","content":"This week's release of the first three post-quantum encryption standards by NIST\u2014FIPS 203, 204, and 205\u2014marks a significant step in securing data against the threat","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 15, 2024","dateGMT":"2024-08-15 12:50:00","modifiedDate":"2024-08-15 21:54:51","modifiedDateGMT":"2024-08-15 21:54:51","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/specific-requirements\/\" rel=\"category tag\">specific requirements<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/defense\/' rel='post_tag'>#Defense<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a><a href='https:\/\/quatronics.com\/tag\/innovation\/' rel='post_tag'>#Innovation<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/securityupdate\/' rel='post_tag'>Securityupdate<\/a>"},"readTime":{"min":2,"sec":4},"status":"publish"},{"id":104,"link":"https:\/\/quatronics.com\/ai-breakthrough-chatgpt-to-streamline-cmmc\/","name":"ai-breakthrough-chatgpt-to-streamline-cmmc","thumbnail":{"url":false,"alt":false},"title":"AI Breakthrough: ChatGPT to Streamline CMMC","excerpt":"","content":"Exciting News for CMMC Compliance! On Monday, Microsoft announced that it has achieved FedRAMP HIGH approval for using OpenAI GPT products in its Azure Government","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 14, 2024","dateGMT":"2024-08-14 18:29:56","modifiedDate":"2024-08-15 21:55:24","modifiedDateGMT":"2024-08-15 21:55:24","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>, <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a> <a href=\"https:\/\/quatronics.com\/category\/updates-in-the-security-field\/\" rel=\"category tag\">updates in the security field<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/ai\/' rel='post_tag'>#AI<\/a><a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/defense\/' rel='post_tag'>#Defense<\/a><a href='https:\/\/quatronics.com\/tag\/fedramp\/' rel='post_tag'>#FedRAMP<\/a><a href='https:\/\/quatronics.com\/tag\/innovation\/' rel='post_tag'>#Innovation<\/a><a href='https:\/\/quatronics.com\/tag\/microsoft\/' rel='post_tag'>#Microsoft<\/a><a href='https:\/\/quatronics.com\/tag\/openai\/' rel='post_tag'>#OpenAI<\/a>"},"readTime":{"min":1,"sec":0},"status":"publish"},{"id":101,"link":"https:\/\/quatronics.com\/cmmc-deadline-looming-dont-get-caught-off-guard\/","name":"cmmc-deadline-looming-dont-get-caught-off-guard","thumbnail":{"url":false,"alt":false},"title":"CMMC Deadline Looming: Don't Get Caught Off Guard","excerpt":"","content":"Are You Ready for the CMMC Shake-Up? Critical Deadlines Are Closer Than You Think! Time is running out for small and medium-sized businesses in the","author":{"name":"Brenda Harper","link":"https:\/\/quatronics.com\/author\/brendaharper1\/"},"date":"Aug 12, 2024","dateGMT":"2024-08-12 12:05:00","modifiedDate":"2024-08-15 21:55:10","modifiedDateGMT":"2024-08-15 21:55:10","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a>, <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>","space":"<a href=\"https:\/\/quatronics.com\/category\/call-to-action\/\" rel=\"category tag\">call to action<\/a> <a href=\"https:\/\/quatronics.com\/category\/general-information\/\" rel=\"category tag\">general information<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/quatronics.com\/tag\/cmmc\/' rel='post_tag'>#CMMC<\/a><a href='https:\/\/quatronics.com\/tag\/compliance\/' rel='post_tag'>#Compliance<\/a><a href='https:\/\/quatronics.com\/tag\/cybersecurity\/' rel='post_tag'>#Cybersecurity<\/a><a href='https:\/\/quatronics.com\/tag\/dib\/' rel='post_tag'>#DIB<\/a><a href='https:\/\/quatronics.com\/tag\/dodcontracts\/' rel='post_tag'>#DoDContracts<\/a><a href='https:\/\/quatronics.com\/tag\/itsecurity\/' rel='post_tag'>#ITSecurity<\/a><a href='https:\/\/quatronics.com\/tag\/smb\/' rel='post_tag'>#SMB<\/a>"},"readTime":{"min":1,"sec":27},"status":"publish"}]