Cybersecurity for Internet of Moving Things

The Internet of Things (IoT) is becoming the backbone for everything from big data and business intelligence to health, entertainment, communication, shipping, and transportation. At the same time, cyber threats to IoT devices are on the rise, posing risks to both businesses and consumers. CSO reports that IoT devices faced three times more attacks in… Read more »

Risk Management Framework at Entrust Solutions: Our Experience, Approach, and Advice

For many government agencies and their contractors who deal with sensitive data, following the Risk Management Framework (RMF) guidelines is required by federal law. But implementing a high-quality RMF goes far beyond simply checking off each protocol one by one. Agencies and contractors engaged with RMF need to have a clear understanding of why this… Read more »

12 Government Contracting Industry Trends in I.T.

If your organization aims to win contracts with the federal government, it’s important to stay informed about the latest government contracting industry trends. Knowing how contracts with the Department of Defense and other government entities are changing can allow you to adapt and better position your business to win upcoming contracts. Read about 12 of… Read more »

Vulnerability Remediation Best Practices for Your Business

Vulnerability remediation best practices include: Understanding your existing infrastructure Having the right scanning tools Creating a system for prioritization Involving your whole team A growing number of business owners recognize the importance of reducing their IT vulnerabilities. You want to protect your assets, including every part of your IT infrastructure that has value to your… Read more »

Military Training Simulation Software: Artificial Intelligence for Armed Servicemembers

You may be aware that the military uses “war games” to train its soldiers, but what exactly is military training simulation software? Broadly speaking, military simulations can refer to a wide range of training methods. Militaries have used everything from mathematical models to comprehensive rehearsals of strategies and weapons in a non-combative environment to prepare… Read more »

Proactive vs Reactive Cyber Security for Your Business

When researching how to safeguard your organization’s sensitive data, you might stop to ask yourself, “What is proactive vs reactive cyber security?” Proactive cyber security involves identifying and addressing security risks before an attack occurs, whereas reactive cyber security involves defending against attacks that have already happened. From company finances to business intelligence, customer information,… Read more »

5 Principles of Information Assurance

To start, what is information assurance? In short, information assurance is the protection of information and how it is processed, used, transferred, and stored. There are 5 principles of information assurance: Availability Integrity Confidentiality Authentication Nonrepudiation Most organizations these days deal with sensitive information of some kind. This includes everything from your company’s bank account… Read more »

Advantages and Disadvantages of Penetration Testing

Businesses, government agencies, and other organizations today are implementing more and more sophisticated cybersecurity to protect against the ever-evolving nature of cyberattacks. One such tactic, penetration testing, is on track to become a $4.5 billion industry by 2025. Penetration testing describes the process of simulating a cyberattack against a computer system, network, website, or application…. Read more »

Entrust Solutions Earns Multiple Award Schedule from the GSA

As of September 2020, Entrust Solutions holds a Multiple Award Schedule (MAS) under the IT Solutions subcategory with the U.S. General Services Administration (GSA) that will last until September 2025. In short, this contract vehicle allows us to offer specialty IT and cybersecurity services to various government and defense agencies at discounted prices. Take a… Read more »

What Is Cyber Monitoring?

What is cyber monitoring and why is it important? Cyber monitoring is the process of continuously observing an IT system in order to detect data breaches, cyber threats, or other system vulnerabilities. It is a proactive cybersecurity practice that can help your IT team sift through cyber events to determine which ones may pose threats… Read more »