Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
Your Incident Response Plan Should Be Your Best Laid Plan

By Erik Briceno

Your Incident Response Plan Should Be Your Best Laid Plan

No matter how strong your cybersecurity posture is, you’re never one hundred percent secure. When an attack does get through – whether the consequences are a data breach, a ransomware lockdown, or worse – you need to have a plan in place. That’s where an “incident response plan” comes into place. Any organization can be targeted by a cyberattack, so having a plan like this is necessary and incredibly useful, no matter what your organization is or its size.   Read more

By Erik Briceno

Zoom Has Touched Up Its Security. Will You Benefit From It?

Video conferencing programs, such as Zoom, are all the rage right now. That shouldn’t come as much of a surprise. It’s a great piece of technology, and being forced to work from home during the COVID-19 pandemic has suddenly elevated these tools, in particular this platform, to a stature that it’s never seen before. Unfortunately, Zoom was never quite prepared for this level of popularity. This became immediately apparent when Zoom-bombing began showing its ugly face in all the worst ways. Hackers are even posting Zoom user account credentials on the Dark Web.

The good news is, Zoom finally bumped up its security. But these improvements are not without a few bumps of their own.   Read more

Yes, Your Company Does Need an MSSP. Here’s Why.

By Erik Briceno

Yes, Your Company Does Need an MSSP. Here’s Why.

It no longer matters what your company does. It doesn’t matter what your organization stands for. It doesn’t matter what you’re selling or even if you’re selling anything. Today, we live in a world where literally everyone is online. Your organization likely has at least some sort of internet presence, regardless of size. And because of that, cybersecurity is a sweeping issue that now affects us all, no matter how much one might think otherwise.

The majority of companies don’t have the time or the cash flow needed to focus on cybersecurity by themselves — not if they hope to focus on what they’re actually trying to do. That’s where a managed security service provider is meant to come in.   Read more

The Expected Evolution of Cybersecurity Threats

By Erik Briceno

The Expected Evolution of Cybersecurity Threats

Cybersecurity threats are evolving to a point many of us thought we wouldn’t see within our lifetime. Have you heard of Moore’s Law? In simple terms, it states that the processing power of computers will double every two years. This law came out in the 1970s and since then, you can see how far technology has come. However, malicious users can also make use of this technology, which means that threats can grow exponentially in a very literal sense. Here’s a brief overview of what we are already starting to see the early stages of, and how they’re expected to get worse over time.   Read more

Managed Security Service Providers 101 (Along With Almost 101 Reasons Why V2 Systems Should Be Your Provider)

By Erik Briceno

Managed Security Service Providers 101 (Along With Almost 101 Reasons Why V2 Systems Should Be Your Provider)

At V2 Systems, we’ve covered the importance of Managed Security Service Providers (MSSP) many times — especially now in 2020. But what exactly is an MSSP? How does V2 Systems help in this realm? In today’s blog, we’re giving a quick crash course on the subject.   Read more

The Time to Prepare for CMMC Is Now. V2 Systems Is Here to Help You Get Started.

By Erik Briceno

The Time to Prepare for CMMC Is Now. V2 Systems Is Here to Help You Get Started.

We are already half-way through 2020. And that means you can’t put off Cybersecurity Maturity Model Certification (CMMC) preparation any longer. We here at V2 Systems are going to help with a short guide for getting the bare basics together, so that you’ll at least be prepared for Level 1 certification. Here’s a quick rundown of everything.   Read more

V2 Systems Is Now ITAR Registered. What does this mean for you?

By Erik Briceno

V2 Systems Is Now ITAR Registered. What does this mean for you?

We here at V2 Systems have recently received our ITAR registration, which is an important prerequisite in providing services to defense contractors. Being ITAR registered and providing managed IT services to federal defense contractors is a unique qualification — one that we will make the most of when providing service to your organization. Here’s how.   Read more

The 5 Levels of CMMC

By Erik Briceno

The 5 Levels of CMMC

Time is ticking on adopting the security postures required by the Cybersecurity Maturity Model Certification (CMMC). We realize that the requirements can feel overwhelming, but like most problems, they can be broken down into parts. And it just so happens that CMMC is divided into five levels, each tier building upon the previous one. The more of these levels your organization achieves, the better you will look when vying for a DoD contract. Here’s a closer look at what they are.   Read more

COVID-19 has everyone on edge, and attackers are taking full advantage

By Erik Briceno

COVID-19 has everyone on edge, and attackers are taking full advantage

Ransomware and phishing attacks are not slowing down during the COVID-19 pandemic. On the contrary, cybersecurity threats are actually seeing a tremendous increase while all of this is going on. Even hospitals, where healthcare staff are putting themselves at great risk to treat coronavirus patients, are seeing a rise in the number of ransomware attacks – so much so that even Microsoft sent out an alert earlier this month to healthcare organizations around the globe.

In a previous blog, we shared guidelines put forth by the Department of Homeland Security, NIST, and others regarding what homebound workers can do on their end to take up a stronger security posture. But what about hospitals and other major industries that are more vulnerable now than ever before?   Read more

CMMC Is Complex, But You Need It If You Want to Do Business.

By Erik Briceno

CMMC Is Complex, But You Need It If You Want to Do Business

You have probably heard about Cybersecurity Maturity Model Certification lately, especially while looking for work in the Federal system. In a previous article, we talked a little about a new set of standards to meet in addition to NIST. As we mentioned, Cybersecurity Maturity Model Certification, or CMMC, is basically an extension of NIST 800-171. Today we’re going to go into a little more detail on what’s involved in meeting CMMC compliance and how V2 Systems can help you achieve certification.   Read more

1 2 3 7
Your Incident Response Plan Should Be Your Best Laid Plan
Your Incident Response Plan Should Be Your Best Laid Plan
Zoom Has Touched Up Its Security. Will You Benefit From It?
Yes, Your Company Does Need an MSSP. Here’s Why.
Yes, Your Company Does Need an MSSP. Here’s Why.
The Expected Evolution of Cybersecurity Threats
The Expected Evolution of Cybersecurity Threats
Managed Security Service Providers 101 (Along With Almost 101 Reasons Why V2 Systems Should Be Your Provider)
Managed Security Service Providers 101 (Along With Almost 101 Reasons Why V2 Systems Should Be Your Provider)
The Time to Prepare for CMMC Is Now. V2 Systems Is Here to Help You Get Started.
The Time to Prepare for CMMC Is Now. V2 Systems Is Here to Help You Get Started.
V2 Systems Is Now ITAR Registered. What does this mean for you?
V2 Systems Is Now ITAR Registered. What does this mean for you?
The 5 Levels of CMMC
The 5 Levels of CMMC
COVID-19 has everyone on edge, and attackers are taking full advantage
COVID-19 has everyone on edge, and attackers are taking full advantage
CMMC Is Complex, But You Need It If You Want to Do Business.
CMMC Is Complex, But You Need It If You Want to Do Business