Defense Industrial Base (DIB) contractors and organization seeking compliance (OSCs) that handle CUI must act now to ensure compliance with the new CMMC v2.
Managed XDR Suite
Petronella’s Managed Extended Detection And Response (XDR) With SOC Allows Any Size Organization With Any Size Budget To Vastly Reduce Cyber Risk.
Many other IT providers our there are just in it for the money. We TRULY care about our customers. When you are our customer, you are part of our family, and we treat you that way.
Think you are up-to-date on your Cyberknowledge? Take this quiz to find out!
Noteworthy Cyberactivists
___ 1. This key player is the director of cybersecurity for the Electronic Frontier Foundation and has researched malware and coordinated security training initiatives.
___ 2. An outspoken digital security and privacy buff, this person gained notoriety after leaking NSA documents in 2013.
___ 3. This cybersecurity activist is known for educating minorities on everything from encryption to cybersecurity.
___ 4. Founded the Guardian Project, a company who develops security-focused mobile apps.
___ 5. A prolific cryptographer and privacy advocate writer who often focuses on questions of cybersecurity.
Bruce Schneier
Edward Snowden
Nathan Freitas
Matthew Mitchell
Eva Galperin
Noteworthy Cyberterms
___ 1. A cyber attack whereby a hacker is able to intercept data/communications by posing as the user’s legitimate target destination.
___ 2. A security measure requiring users to confirm their identity through a second mean of their choosing, usually with a verification code, before allowing user access to a site or service.
___ 3. A program that adds additional security and privacy to a user by running communications through multiple layers of encryption.
___ 4. An wide-ranging attempt to collect sensitive data from unsuspecting targets by impersonating a trusted and legitimate source.
___ 5. A system that allows a user to connect remotely with another network via secure encryptions over the internet.
___ 6. A targeted, malicious email whose goal is to trick a specific individual into revealing compromising data.
___ 7. A communications technology in which only the intended recipient of a message has the ability to decrypt it.
___ 8. Systems that attempt to block surveillance.
Noteworthy Cyberactivists: 1. E, 2. B, 3. D, 4. C, 5. A
Noteworthy Cyberterms1. b, 2. g, 3. f, 4. d, 5. h, 6. e, 7. a, 8. C
Protect Your Business Today
Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.
Need help implementing these strategies?Our cybersecurity experts can assess your environment and build a tailored plan.
CEO & Founder, Petronella Technology Group | CMMC Registered Practitioner
Craig Petronella is a cybersecurity expert with over 24 years of experience protecting businesses from cyber threats. As founder of Petronella Technology Group, he has helped over 2,500 organizations strengthen their security posture, achieve compliance, and respond to incidents.