Technology Guidance for Business Leaders

Subscribe to our blog to stay informed!

Dr. Jerry Craig

Dr. Jerry Craig
Jerry is Ntiva’s Sr. Director of Security and CISO, offering more than 20 years in the IT and cybersecurity industry. Certified CISO, CISSP and CCSP, Jerry also serves part-time as Adjunct Professor in the University of Maryland Global Campus.
Mobile Security: Deciphering Corporate-Owned vs. BYOD Strategies

As mobile technology takes over our daily lives, the boundaries between work and personal tech are fading fast, posing fresh challenges and decisions for businesses...


The Impact of AI on Cybersecurity: Shaping the Future

Every day, we're finding out just how much AI is changing the game, especially in the world of cybersecurity.

It's pretty interesting out there—an exciting mix of...


CMMC 2.0 Compliance For DoD Contractors

By now, most government contractors are aware of the upcoming Cybersecurity Maturity Model Certification (CMMC). This comprehensive guide will show you how to prepare,...


Data Protection & Integration in M&A: The Key to a Successful Deal

Is your company considering a merger or acquisition? Well, buckle up and get ready for a challenging journey through one of the most complex tasks your company may...


Safeguarding Your Company Data: Mastering Insider Threat Detection

Data is not only your most valuable asset, but it can also be your biggest vulnerability in the ever-changing business landscape.

Insider threats, often overlooked amidst...


Understanding Phishing: A Practical Guide

These days, phishing attacks pose a constant and imminent threat. They are both elusive and ever-evolving, capable of targeting anyone, anywhere.

That's why as...


Acing Your Cybersecurity Audit: The Ultimate Guide

Stepping into a cybersecurity audit can feel overwhelming, right?  You've got to make sure everything's locked down tight, but where do you even start?

Well, diving...


EDR/MDR: Unmasking These Cyber Superheroes

Navigating the intricate world of cybersecurity can be tricky business, especially with terms like EDR and MDR flying around!

They might sound like secret codes, but...


Cracking The Code: IDS, IPS, SIEM Decoded For Non-Tech Titans

Have you ever come across terms like IDS, IPS, SIEM and felt like you were decoding a tech riddle?

We understand your frustration! These terms are crucial in the world of...


Navigating Cyber Insurance: Everything You Need to Know

Cyberattacks have become commonplace in the business landscape. Cyber insurance is more important than ever, but many don't understand how much coverage they need, what is...


Configuration and Change Management: Types of IT Documentation Your Business Needs

Change and/or configuration management systems always seem to fall on the back burner while businesses are growing. After all, who has time to implement a thorough...


Tabletop Testing: Is Your Business Prepared for a Cybersecurity Disaster?

When is the last time you really tested your network infrastructure? More than just sending out a fake phishing email to your staff for employee training; serious disaster...


The Simplest Path to CMMC Compliance: Support from Ntiva

Ntiva helps government contractors achieve CMMC (Cybersecurity Maturity Model Certification) compliance as quickly and efficiently as possible so they can get back to...


Zero Trust Security: What is It and Who Needs It?

It seems like new cybersecurity issues pop up every day. With more and more devices connecting to the internet, and default security settings leaving something to be desired,...


Penetration Testing: What is it and Why is it Important?

Penetration testing is the best way to know that your organization's data is secure, with no overlooked vulnerabilities or forgotten loopholes to allow your data to be...


Vulnerability Management 101: Scanning & Remediation

Vulnerability management is a very deep topic, consisting of far more than just an anti-virus scan and an automated monthly report, but you don't need a degree in Computer...


2023 Business Cybersecurity Tools: Where Do They Fit in Your SMB?
How much should your business be spending on cybersecurity this year? The truth is, there is no one size-fits-all answer. With variables like employee count, tech stack, and...
How AI Will Affect Cybersecurity in 2023

It's 2023, and every company on the planet is fighting a daily battle against cyber threats and attacks. We're almost numb to the daily reports on breaches as the cybercrime...


CMMC 3.14: System and Information Integrity
The final section of our CMMC series is upon us! Today we're going to cover "System and Information Integrity." This is a fairly short and simple set of controls implement....
CMMC Section 3.13: System and Communications Protection
We're almost there! This month, we're covering Cybersecurity Maturity Model Certification (CMMC) 2.0 Section 3.13: System and Communications Protection. This is one of the...
CMMC Section 3.11 and 3.12: Risk and Security Assessments
This month, we're combining sections 3.11 and 3.12 to cover "Risk and Security Assessments." We'll cover seven total controls in this, most of which are fairly short, simple,...
CMMC Section 3.10: Physical Protection
CMMC Section 3.10 breaks down "physical protection" of controlled unclassified information (CUI). While this particular section of CMMC 2.0 is rather straightforward with...
CMMC Section 3.8: Media Protection

Today we’ll break down CMMC Section 3.8, which focuses on the media protection for media that contains controlled unclassified information (CUI).

It’s important to remember...


CMMC Section 3.6: Incident Response

Today we are focusing on a review of CMMC Section 3.6, which provides individual practices for incident response after a cyberattack. The biggest takeaway? Good cybersecurity...


How Much Should Cybersecurity Cost Your Business?

When organizations are looking for ways to save money, cybersecurity sometimes ends up on the chopping block. For those companies fortunate enough to never have gone through...


Small Business Cybersecurity: How to Protect Yourself Against Hackers

By the time you get to the end of this sentence, a cybercriminal will have successfully attacked a business and infected it with ransomware. According to Cybercrime Magazine,...


CMMC Section 3.5: Identification and Authentication

When it comes to achieving CMMC compliance, the old business maxim holds true — it’s not what you know, it’s who you know.

One of the most vital protections you have against...


CMMC Section 3.4: Configuration Management

Configuration management is vital, both within the CMMC framework and in general from a security and IT perspective.

Configuration management ranks right up there with...


CMMC Section 3.3: Cybersecurity Audit and Accountability

The Cybersecurity Maturity Model Certification 2.0 (CMMC) includes practices and controls that fall under the category of “Audit and Accountability.”

Unlike with other areas...


CMMC 2.0 Updates - April 2022

The U.S. Department of Defense (DoD) published Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) in November 2021 to safeguard sensitive national security...


CMMC Cybersecurity Awareness, Training and Personnel Security

If your organization is working toward Cybersecurity Maturity Model Certification (CMMC), then you will eventually come across the sections dealing with cybersecurity...


2022 Tips on Achieving CMMC Compliance: Access Control

If your organization wants to achieve Cybersecurity Maturity Model Certification (CMMC), you need to understand Access Control.

Not just what it is, but the process. And the...