Control and monitor the use of mobile code

Reading Time: < 1 minute Ensuring compliance with DFARS, NIST SP 800-171, and CMMC standards is essential for protecting sensitive information and maintaining a competitive edge in the defense industry. Today, we focus on an important aspect of CMMC 2.0: Control SC.L2-3.13.13. CMMC 2.0 Compliance Tip: Control SC.L2-3.13.13 Control SC.L2-3.13.13 requires the control and monitoring of mobile code use within your […]

The Role of Third-Party Assessors in CMMC Certification: What Defense Contractors Need to Know

Reading Time: 2 minutes In the dynamic and high-stakes world of defense contracting, ensuring the security of sensitive information is paramount. The Cybersecurity Maturity Model Certification (CMMC) has become a crucial component for defense contractors looking to secure Department of Defense (DoD) contracts. Central to this certification process are third-party assessors. But what exactly do they do, and why […]

Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device

Reading Time: 2 minutes Staying compliant with DFARS, NIST SP 800-171, and CMMC standards is critical for protecting sensitive information and maintaining your competitive edge in the defense sector. Today, we want to highlight an essential aspect of CMMC 2.0: Control SC.L2-3.13.12. CMMC 2.0 Compliance Tip: Control SC.L2-3.13.12 Control SC.L2-3.13.12 mandates the prohibition of remote activation of collaborative computing devices […]

Employ FIPS-validated cryptography when used to protect the confidentiality of CUI

Reading Time: < 1 minute Staying compliant with DFARS, NIST SP 800-171, and CMMC standards is crucial for safeguarding sensitive information and maintaining your competitive edge in the defense sector. Today, we want to highlight an essential aspect of CMMC 2.0: Control SC.L2-3.13.11. CMMC 2.0 Compliance Tip: Control SC.L2-3.13.11 Control SC.L2-3.13.11 requires employing FIPS-validated cryptography to protect the confidentiality of Controlled […]

Mastering CMMC: Achieving Cybersecurity Maturity for DoD Contracts

Reading Time: 2 minutes In today’s digital landscape, cybersecurity is a top priority, especially for organizations seeking to do business with the Department of Defense (DoD). The Cybersecurity Maturity Model Certification (CMMC) has emerged as a crucial framework for ensuring that defense contractors meet specific cybersecurity standards. Achieving CMMC certification is not only essential for compliance but also for […]

Addressing Common Misconceptions About CMMC for Defense Contractors

Reading Time: 2 minutes The Cybersecurity Maturity Model Certification (CMMC) has become a cornerstone of cybersecurity regulations in the defense industry, setting stringent standards for contractors seeking to do business with the Department of Defense (DoD). However, there are several misconceptions and uncertainties surrounding CMMC requirements that can lead to confusion among defense contractors. In this blog post, we […]

The Role of Third-Party Assessors in CMMC Certification

Reading Time: 2 minutes For defense contractors seeking Cybersecurity Maturity Model Certification (CMMC) compliance, understanding the role of third-party assessors is crucial. Third-party assessors play a pivotal role in the CMMC certification process, providing independent evaluations of contractors’ cybersecurity practices. In this blog post, we’ll delve into the importance of third-party assessors in CMMC certification and address common questions […]

Understanding The Complexities Of CMMC Certification: Insights From A Certified Assessor

Reading Time: 8 minutes As a certified CMMC assessor and auditor, I have encountered numerous organizations struggling to navigate the complexities of achieving CMMC certification. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework developed by the US Department of Defense that aims to enhance cybersecurity measures across its supply chain. This article offers valuable insights from my […]

CMMC Certification: Steps to Achieve Compliance for Defense Contractors

Reading Time: 3 minutes The Cybersecurity Maturity Model Certification (CMMC) is rapidly becoming a linchpin in the defense industry’s efforts to secure its supply chain. As a defense contractor, CMMC compliance isn’t just another hoop to jump through; it’s a cornerstone of your eligibility to work on projects vital to national security. This blog post will guide you through […]

Prohibit the use of portable storage devices when such devices have no identifiable owner

Reading Time: < 1 minute At On Call, we strive to be your trusted beacon in navigating the intricate world of cybersecurity standards. Today, we’re casting a spotlight on Control MP.L2-3.8.8 – a control that plays a pivotal role in protecting your data by prohibiting the use of portable storage devices without an identifiable owner. 🔒 Why Control MP.L2-3.8.8 Is […]