Quatronics
  • Home
  • Articles
  • Download FREE CMMC Checklist
  • Podcast

call to action

posts that bring the urgency of CMMC compliance to the readers attention and call them to take charge via Quatronic’s services.

call to action

Phone Fortress: How to Keep Your Mobile Device Secure

Our mobile phone system in the US is compromised.  Government and cell phone companies have confirmed that. Here are my Key takeaways from the CISA Mobile Communications Best Practice Guidance, which was released this week. By taking these key steps you can better secure your mobile communications

By James Harper, 5 monthsDecember 25, 2024 ago
call to action

Authenticator Security: A Closer Look at the Limitations

Many of us trust Google Authenticator to add a layer of security to our accounts. But, Google Authenticator has a serious security vulnerability which makes it unacceptable for CMMC compliance and dubious for general use. By default, Google Authenticator syncs your one-time codes to your Google account in the Cloud. Read more…

By James Harper, 5 monthsDecember 24, 2024 ago
call to action

Act Now: Protect Your Phone From the Latest Threats

Our mobile phone system in the US is compromised.  Government and cell phone companies have confirmed that. Here are my Key Takeaways from the CISA Mobile Communications Best Practice Guidance, which was released this week. Adopt Phishing-Resistant Authentication. Use FIDO2 security keys or passkeys for secure, phishing-resistant multifactor authentication (MFA). Read more…

By James Harper, 5 monthsDecember 20, 2024 ago
call to action

Bluetooth and CUI – A Recipe for Disaster

Bluetooth should be avoided on systems doing any kind of work for the Federal government – DoD or civilian. When tightening security for system access, it’s important to consider all vectors of attack—especially Bluetooth-enabled peripherals like keyboards, mice, earbuds, and other devices. Here’s why: CMMC Control AC.L1-3.1.1 (Access Control): This Read more…

By James Harper, 6 monthsDecember 3, 2024 ago
call to action

Is Your Office Bugged? Maybe Not, But…Your Friendly Neighborhood Spy

You might think sophisticated hackers need to crack complex codes or plant hidden devices to steal your company’s secrets. But the truth is, sometimes the easiest way in is through your own front door…or rather, your microphone. This week, I heard a chilling story about a client. An executive, let’s Read more…

By James Harper, 6 monthsNovember 29, 2024 ago
call to action

CMMC Deadline Looming: Don’t Get Caught Off Guard

Are You Ready for the CMMC Shake-Up? Critical Deadlines Are Closer Than You Think! Time is running out for small and medium-sized businesses in the DIB to achieve CMMC compliance. The government is about to finalize the rule that will make the CMMC program mandatory. The clock is ticking. If Read more…

By James Harper, 9 monthsAugust 12, 2024 ago
CMMC
HIPAA
PCI-DSS
NYDFS
ISO 27001
Hestia | Developed by ThemeIsle