Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
target board with darts

By Erik Briceno

Your DoD Cyberscore and You

If you’re a government contractor, you’re probably at least partially familiar with NIST 800-171. Even if you don’t have every detail completely memorized, the vast majority of your cyber hygiene policies should be coming directly from NIST guidelines.

To assist in maintaining compliance with what’s outlined in NIST 800-171, we’ve been guiding several of our contractors with the intricacies of the NIST 800-171 “scorecard.” Supplier Performance Risk System, or SPRS, is essentially a score that reflects the contractor’s accomplishment of the NIST cybersecurity requirements. Here are the basics of how it works.   Read more

Should Cisco Umbrella and Meraki MR Still Be Used in 2021?

By Erik Briceno

Should Cisco Umbrella and Meraki MR Still Be Used in 2021?

In an article we wrote as far back as 2019, we mentioned that one of the strongest tools in our arsenal was one that we ourselves at V2 Systems make use of: Cisco Umbrella. We then outlined in detail why we thought it was such a useful utility. But now that we’ve arrived in 2021, do products such as Umbrella and Meraki MR still pair up well with each other?

The short answer is yes — they absolutely do. Because Meraki MR is also technically a Cisco product these days (Meraki was actually acquired by Cisco in 2012.), it integrates seamlessly with Umbrella. They were essentially made for each other. Here’s what Meraki MR is and how Umbrella works within a Meraki network.   Read more

It’s 2021. Isn’t it about time to start outsourcing your IT?

By Erik Briceno

It’s 2021. Isn’t it about time to start outsourcing your IT?

2020 was a chaotic time, but it’s a brand new year. It’s still chaotic in many ways, but change is inevitable no matter how consistent things may seem. The way a company handles that change can mean the difference between success and failure.

One of the biggest changes you can make is deciding to outsource your IT support. As far as changes go, it’s definitely one of the better ones. It can improve performance measures in terms of cost, quality, service and speed. To ensure the change is made smoothly, you need to look for a managed service provider who will work to understand your company and analyze your needs, and then translate those objectives and processes into solutions that span the lifecycle of your entire IT infrastructure.   Read more

Want to reduce overhead costs and increase employee productivity? Partner with an IT managed services provider.

By Erik Briceno

Want to reduce overhead costs and increase employee productivity? Partner with an IT managed services provider.

A partnership between your organization and your managed services provider ultimately frees your staff to remain focused on your vision and allows you to stay committed to fulfilling it. By partnering with an IT managed services provider, the end result is a successful two-pronged strategy: a large reduction of overhead costs, as well as an increase in employee productivity. Here’s a brief look at how that is.   Read more

Working from home? An assessment is long overdue.

By Erik Briceno

Working from home? An assessment is long overdue.

If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.   Read more

Holiday Phishing in a Global Pandemic

By Erik Briceno

Holiday Phishing in a Global Pandemic

For those who celebrate, it’s that time of year again — a time for decorations, eating food that you normally wouldn’t, and of course, maxing out credit cards on holiday shopping for gifts or the aforementioned expenditures. But with many of us doing both our shopping and our working from home this year due to COVID-19, the environment in 2020 poses an even greater risk to cybersecurity.

This year, it’s not just individuals who need to keep an eye on their wallets and protect themselves from scammers and thieves. Businesses and organizations of all sizes need to be aware of holiday phishing scams and how they pose a risk to your entire company.   Read more

The “Art” of Phishing Scams in 2020

By Erik Briceno

The “Art” of Phishing Scams in 2020

2020 has presented a slew of challenges for everyone. IT professionals worldwide have stories of their own to share — not only facing the challenge of adopting work-from-home technology and infrastructure, but also that of new attack vectors presented by the COVID-19 pandemic and those who would take advantage of them.

Phishing in particular has seen a tremendous increase as a method of attack, and phishing scams are becoming even more elaborate. In today’s blog, we break down some of the top phishing scams of 2020 and how you can protect your organization from becoming a victim.   Read more

Following HIPAA Guidelines Is More Important Than Ever

By Erik Briceno

Following HIPAA Guidelines Is More Important Than Ever

Are you familiar with HIPAA?

If you work in the health care industry in any capacity, you definitely should be. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge.

In the wake of COVID-19, following HIPAA guidelines has suddenly become more important than ever. Here’s why.   Read more

Cybersecurity Trends in 2020 in a Post-COVID World

By Erik Briceno

Cybersecurity Trends in 2020 in a Post-COVID World

We’re coming up to the end of 2020 soon, and this year has seen a lot. Largely thanks to COVID-19, the cybersecurity landscape has changed drastically. Here’s a summary of some of the major changes we’ve seen this year in terms of cybersecurity trends.   Read more

A Refresher on Multi-Factor Authentication

By Erik Briceno

A Refresher on Multi-Factor Authentication

These days, everyone should know what MFA is. Multi-factor authentication is something we’ve covered before as an important, basic step in cybersecurity hygiene. It’s so important in fact, that it’s even part of the Cybersecurity Maturity Model Certification (CMMC) framework.

For those of you who are still unfamiliar with MFA and/or how to implement it, here is a quick but important refresher.   Read more

1 2 3 4 5
target board with darts
Your DoD Cyberscore and You
Should Cisco Umbrella and Meraki MR Still Be Used in 2021?
Should Cisco Umbrella and Meraki MR Still Be Used in 2021?
It’s 2021. Isn’t it about time to start outsourcing your IT?
It’s 2021. Isn’t it about time to start outsourcing your IT?
Want to reduce overhead costs and increase employee productivity? Partner with an IT managed services provider.
Want to reduce overhead costs and increase employee productivity? Partner with an IT managed services provider.
Working from home? An assessment is long overdue.
Working from home? An assessment is long overdue.
Holiday Phishing in a Global Pandemic
Holiday Phishing in a Global Pandemic
The “Art” of Phishing Scams in 2020
The “Art” of Phishing Scams in 2020
Following HIPAA Guidelines Is More Important Than Ever
Following HIPAA Guidelines Is More Important Than Ever
Cybersecurity Trends in 2020 in a Post-COVID World
Cybersecurity Trends in 2020 in a Post-COVID World
A Refresher on Multi-Factor Authentication
A Refresher on Multi-Factor Authentication