Resources & Industry News

Slate understands how challenging it is to keep up with industry news regarding the latest threats, attacks, emerging and potential threats. The following links are great resources for our staff and customers in helping to understand the current landscape in the Cybersecurity space. Each link has a specialized focus that contains great information. Check back frequently to see additional resources and to keep up with our latest blog posts!

Subscribe to Newsletter

If you are a federal government contractor, you are preparing your organization for the Cybersecurity Maturity Model Certification (CMMC). The United States Department of Defense is moving towards the CMMC to standardize the cybersecurity requirements across the Defense Industrial Base (DIB). The goal is to ensure the federal government’s controlled unclassified information (CUI) is not at risk.

Read More

If you are a federal government contractor, you are preparing your organization for the Cybersecurity Maturity Model Certification (CMMC). The United States Department of Defense is moving towards the CMMC to standardize the cybersecurity requirements across the Defense Industrial Base (DIB). The goal is to ensure the federal government’s controlled unclassified information (CUI) is not at risk.

Read More

Our day-to-day lives have become so busy, that we often forget to maintain and update passwords unless it is forced upon us by third-party applications or corporate requirements. As our lives move into a more remote lifestyle, a lot of our work has moved into cloud-based services.

Read More

Our day-to-day lives have become so busy, that we often forget to maintain and update passwords unless it is forced upon us by third-party applications or corporate requirements. As our lives move into a more remote lifestyle, a lot of our work has moved into cloud-based services.

Read More

Almost one year has passed since COVID-19 changed our daily lives, from how we interact with friends and family to how we conduct our daily work efforts. Over this time, we have found that the move to a more remote workforce has also brought some undesired security consequences. Most organizations were forced to rapidly transition to a remote business model that they may not have been prepared to move into. Information Technology (IT) Departments deployed remote capabilities so their workforce could continue to operate, all while dismissing security controls that they would otherwise be sensitive to applying before these capabilities were deployed.

Read More

At Slate Enclave, our private school clients have a lot of questions when it comes to FERPA and how they can protect student education records. The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects students’ private information in schools that receive funds from the U.S. Department of Education.

Read More

HIPAA Journal published their list of the largest Healthcare Data Breaches for 2020 and it shows a troubling trend over the past 10 years. In 2010, there were 199 reported breaches. That number increased to 616 reported healthcare breaches in 2020. These numbers are on the conservative side because they only include breaches of more than 500 records. Healthcare organizations are only legally required to announce a data breach at this amount.

Read More

Cyberattacks have a tremendous impact on an organization’s reputation. According to Varonis, 80% of consumers will not use a business that was a victim to a breach. Additionally, 85% will tell others of the incident, showing that even if a person is not a victim of the breach, they will still be aware of the organizations breach and potentially not use them.

Read More

If you are a Government Contractor with a DFARS 252.204-7012 clause in your contract, the U.S. Department of Defense has announced a new interim rule, which goes into effect on November 30, 2020.

Read More

You just had your Security Assessment completed and received the debrief, which is a report detailing each potential security vulnerability that was identified. As many organizations have done in the past, you review the report and wonder where to begin.

Read More