Our Director of Cybersecurity offers cautionary advice for those hoping to delay the spend.
Learn about cybersecurity scoring from our Director of Cybersecurity – and how to use your score.
Every employer is up at night thinking about their workforce. How to keep them. How to engage them. How to attract them. Employees want to work from home. Managers want to go back to the office. Whether you are operating remote or in person – or a hybrid of both – one thing is clear: […]
AppDeveloper Magazine January 18, 2022 Edward Tuorinsky is the Managing Principal of DTS, a Service-Disabled Veteran-Owned Small Business, that provides information technology and management consulting services in the areas of program management, governance, strategic planning, organization advancement, business process efficiency, software development, system integration, and learning enhancement solutions. Tuorinsky shares his 2022 predictions about security compliance, increased […]
Using innovation on the job takes many forms. You might be a problem solver, a designer, a planner, or use new technology in your work. With so many ways to tap into innovation on-the-job, it’s a topic that deserves its own issue. In this edition of the Best of DTS, we share how to encourage […]
You’ve been diligent about cyber protocols. No attacks or breaches. No uh-oh moments with employees. You’re feeling cautiously optimistic and ahead of the curve. But this is no time to relax. While thousands of U.S. companies will meet the standards set by NIST and CMMC in response to an Executive Order to improve the nation’s cybersecurity, […]
As kids head back to school this fall, we can all be inspired to learn something new. We have to! Hiring has gone from challenging to nearly impossible, placing an emphasis on learning programs that enrich and develop the skills of current employees. Our focus for this newsletter therefore is all about learning on the […]
Who can you trust these days? If you’re about to jump into an agreement with another company, you want to hear the good — and the bad. Pulling a credit report might start the process, as this can help verify basic facts about the company and provide a credit summary and financial history. Is that […]
Overcome human nature with a “lock the door” mentality The ‘human factor’ has been recognized as the weakest link in creating safe and secure digital environments – but human intuition may also be the solution to thwarting many cyber threats. Every software or security monitoring system requires human interpretation of alerts. And our brains have […]
By now, you are familiar with the term CMMC—the DoD’s Cybersecurity Maturity Model Certification requirements as part of the Pentagon’s mandate to protect the industrial base networks and controlled unclassified information from cyber-attacks. What you may not know is where your company falls in the process. And you might be worried about the costs involved.