Technology Guidance for Business Leaders

Subscribe to our blog to stay informed!

Dr. Jerry Craig

Dr. Jerry Craig
Jerry is Ntiva’s Sr. Director of Security and CISO, offering more than 20 years in the IT and cybersecurity industry. Certified CISO, CISSP and CCSP, Jerry also serves part-time as Adjunct Professor in the University of Maryland Global Campus.
How AI Will Affect Cybersecurity in 2023

It's 2023, and every company on the planet is fighting a daily battle against cyber threats and attacks.  We're almost numb to the daily reports on breaches as the cybercrime...


CMMC 3.14: System and Information Integrity
The final section of our CMMC series is upon us! Today we're going to cover "System and Information Integrity." This is a fairly short and simple set of controls implement....
CMMC Section 3.13: System and Communications Protection
We're almost there! This month, we're covering Cybersecurity Maturity Model Certification (CMMC) 2.0 Section 3.13: System and Communications Protection. This is one of the...
CMMC Section 3.11 and 3.12: Risk and Security Assessments
This month, we're combining sections 3.11 and 3.12 to cover "Risk and Security Assessments." We'll cover seven total controls in this, most of which are fairly short, simple,...
CMMC Section 3.10: Physical Protection
CMMC Section 3.10 breaks down "physical protection" of controlled unclassified information (CUI). While this particular section of CMMC 2.0 is rather straightforward with...
CMMC Section 3.8: Media Protection

Today we’ll break down CMMC Section 3.8, which focuses on the media protection for media that contains controlled unclassified information (CUI).

It’s important to remember...


CMMC Section 3.6: Incident Response

Today we are focusing on a review of CMMC Section 3.6, which provides individual practices for incident response after a cyberattack. The biggest takeaway? Good cybersecurity...


How Much Should Cybersecurity Cost Your Business?

When organizations are looking for ways to save money, cybersecurity sometimes ends up on the chopping block. For those companies fortunate enough to never have gone through...


Small Business Cybersecurity: How to Protect Yourself Against Hackers

By the time you get to the end of this sentence, a cybercriminal will have successfully attacked a business and infected it with ransomware. According to Cybercrime Magazine,...


CMMC Section 3.5: Identification and Authentication

When it comes to achieving CMMC compliance, the old business maxim holds true — it’s not what you know, it’s who you know.

One of the most vital protections you have against...


CMMC Section 3.4: Configuration Management

Configuration management is vital, both within the CMMC framework and in general from a security and IT perspective.

Configuration management ranks right up there with...


CMMC Section 3.3: Cybersecurity Audit and Accountability

The Cybersecurity Maturity Model Certification 2.0 (CMMC) includes practices and controls that fall under the category of “Audit and Accountability.”

Unlike with other areas...


CMMC 2.0 Updates - April 2022

The U.S. Department of Defense (DoD) published Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) in November 2021 to safeguard sensitive national security...


CMMC Cybersecurity Awareness, Training and Personnel Security

If your organization is working toward Cybersecurity Maturity Model Certification (CMMC), then you will eventually come across the sections dealing with cybersecurity...


CMMC 2.0: A Comprehensive Guide For DoD Contractors

By now, most government contractors are aware of the upcoming Cybersecurity Maturity Model Certification (CMMC). We're providing this comprehensive guide to show you how to...


2022 Tips on Achieving CMMC Compliance: Access Control

If your organization wants to achieve Cybersecurity Maturity Model Certification (CMMC), you need to understand Access Control.

Not just what it is, but the process. And the...