Skip to content

Why you should go beyond the cyber requirements for OASIS+

By Edward Tuorinsky

Just don’t check the boxes for your OASIS+ proposals because your approach to cybersecurity might be the key differentiator for winning task orders, especially for small businesses. After months of work, checking a few boxes on the OASIS+ Pre-Award Questionnaire was no big deal. But now that the dust has settled, you might wonder what … Continued

Lessons learned from a joint surveillance audit for CMMC

By Edward Tuorinsky

Microsoft recently had an opportunity to sit down with Derek Kernus, Director of Cybersecurity Operation at DTS, to discuss their experience with the Joint Surveillance Voluntary Assessment (JSVA).  The Joint Surveillance Voluntary Assessment (JSVA) program is a transitional certification to CMMC, a new cybersecurity framework for Defense Industrial Base (DIB) contractors. The Joint Surveillance Voluntary Assessment … Continued

What does it cost small businesses to get advanced cybersecurity?

By Edward Tuorinsky

In this Expert Insight, Derek Kernus, the Director of Cybersecurity Operations at DTS talks about the challenges facing small businesses that are under pressure to adopt cybersecurity best practices without breaking their budget. Derek offers suggestions for prioritizing cybersecurity investments – and things to watch out for as you build out an advanced cybersecurity program. … Continued

Hiring IT Help: Do you need an MSP or MSSP, or both?

By Edward Tuorinsky

Outsourcing can help your company grow, handling specialized tasks, often for less than the cost of a single annual salary. IT and cybersecurity are two areas where niche knowledge is essential, so it’s no surprise that 81% of companies use third-party vendors to handle part or all of their cybersecurity needs. As technical needs have evolved, two … Continued

eBook: The Real Business on Cybersecurity

By Edward Tuorinsky

Every business has a need to protect information, customers, and computer systems. But every business has approached cybersecurity differently―and those stalling or lagging behind remain at risk. Protect your Information. To guide business leaders in their efforts―no matter where they may be on the cybersecurity lifecycle―DTS experts have put together a guide about compliance and … Continued

Three Things To Do Before Hiring A Cybersecurity Company

By Edward Tuorinsky

We’re a nation of sleepless business owners—up late worrying about the many aspects of business that we can’t control. The top of this list might include things like the threat of a cyberattack, meeting compliance standards and the cost of adding cybersecurity to everyday operations. With the introduction of several security frameworks, you now have … Continued

5 Ways Businesses Can Have a Startup Mindset for Cybersecurity

By Edward Tuorinsky

Cybersecurity is multifaceted. It’s not just technical controls and policies and procedures but culture too. That’s why companies that are founded with a startup mindset, a clear network architecture, and tough cybersecurity policies in place have an easier time of it than companies that have to add security to their legacy systems, established operations, and … Continued

How to Grow Your Business: Lessons Learned

By Edward Tuorinsky

Companies change, morph, and, if you’re lucky, grow. Millions of businesses have been launched from a single idea and heaps of hope to make it big someday. But as we all know, in between the idea and the payout, there’s a whole lot of work to be done. Growing a business takes effort. Following a … Continued