All posts by Sharice Ruan

10 Reasons Why Microsoft 365 E5 Licenses Are the Best for Effective Cybersecurity

Microsoft 365 E5

Today’s organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data wherever they’re located. For Cloud Only and Cloud/On-Premise hybrid environments, a comprehensive cybersecurity program will help you effectively manage and protect all your devices and identities, […]

Read more

How to Find the Best CMMC Consultant for Your Business

CMMC Consultant

Small and mid-sized businesses seeking to secure contracts with the Department of Defense (DoD) must adhere to growing cybersecurity standards including the Cybersecurity Maturity Model Certification (CMMC). CMMC certifies that businesses can protect Controlled Unclassified Information (CUI) that they create or receive as part of their business with the DoD. Unfortunately for many, navigating the […]

Read more

Does DFARS 252.204-7024 Include Your NIST SP 800-171 Self-Assessment?

DFARS

The new Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7024 final rule is here! It was recently implemented by the Department of Defense (DoD) to revise how contracting officers use the Supplier Performance Risk System (SPRS) when evaluating bids for contracts. The final rule requires contracting officers to consider item risk, price risk, and supplier risk data when […]

Read more

Microsoft Start Menu & Task Bar Icon Issue

Microsoft Icons

Due to a recently pushed Microsoft patch roll-up, Microsoft Defender ASR (Attack Surface Reduction) rules are removing icons in the Start Menu and invalidating Quick Launch icons for both non-Microsoft and some Microsoft applications. This is a worldwide phenomenon and a known issue. Microsoft is aware and working to resolve this.  Ardalyst is implementing the […]

Read more

The True Cost of Waiting on CMMC

CMMC Certification Cost

For the last few years, CMMC, the Cybersecurity Maturity Model Certification, has been a huge topic of discussion among the U.S. Government and the Defense Industrial Base (DIB). What started as an Executive Order over a decade ago to protect CUI has had a slow, incremental rollout, and revisions. Now, with CMMC 2.0, defense contractors […]

Read more

Five Steps to Building Your CMMC Strategy

Five Steps to Building an Effective CMMC Strategy

The time to get CMMC compliant is now! Stacy Bostjanick, the Department of Defense’s Chief Information Officer, announced that they are eyeing March 2023 for the release of CMMC 2.0, and the DoD would begin implementing CMMC in contracts as early as May 2023. Depending on where you are in your compliance journey, this leaves […]

Read more

Medium Assessments are Here! – What this Means for You & Your SPRS Score

Medium Assessments

Since November 30, 2020, the DFARS 252.204-7019 clause has required DoD contractors to complete a Basic Assessment of their compliance with NIST 800-171. A Basic Assessment is a self-assessment using your organization’s System Security Plan (SSP) and Plan of Actions and Milestones (POAM) to calculate your score out of NIST 800-171’s 110 controls. This score […]

Read more

CMMC 2.0: Should Your Small Business Get Started?

CMMC

There has been a lot of speculation about the Cybersecurity Maturity Model Certification (CMMC) in recent years. Some question whether it will ever be required. Others see its delay as a sign of failure. Whatever your thoughts, the lull we’re experiencing has fueled inactivity amongst the defense industrial base (DIB). Many small and midsize businesses […]

Read more

Ardalyst & The Cybersecurity Affordability Line

Cybersecurity Poverty Line

If you’re a small or mid-sized business that’s wondering how you will afford to meet growing cybersecurity requirements, you’re not alone. Many small and mid-sized businesses struggle to budget for the necessary technology and resources to keep their data and their business safe because the tools are either far too expensive or require large purchase […]

Read more

Breaking Down Zero Trust Architecture and Exploring Its Gaps

Zero Trust Architecture

Only two years into the new decade and our nation has been faced with increasing operational challenges. The pandemic turned us into a “remote-first world” making us more digitally dependent than we’ve ever been. As we’ve made this digital shift, we’ve also seen our traditional cybersecurity perimeters do the same to account for cloud solutions […]

Read more