Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems

By Erik Briceno

Zoom Has Touched Up Its Security. Will You Benefit From It?

Video conferencing programs, such as Zoom, are all the rage right now. That shouldn’t come as much of a surprise. It’s a great piece of technology, and being forced to work from home during the COVID-19 pandemic has suddenly elevated these tools, in particular this platform, to a stature that it’s never seen before. Unfortunately, Zoom was never quite prepared for this level of popularity. This became immediately apparent when Zoom-bombing began showing its ugly face in all the worst ways. Hackers are even posting Zoom user account credentials on the Dark Web.

The good news is, Zoom finally bumped up its security. But these improvements are not without a few bumps of their own.   Read more

The 5 Levels of CMMC

By Erik Briceno

The 5 Levels of CMMC

Time is ticking on adopting the security postures required by the Cybersecurity Maturity Model Certification (CMMC). We realize that the requirements can feel overwhelming, but like most problems, they can be broken down into parts. And it just so happens that CMMC is divided into five levels, each tier building upon the previous one. The more of these levels your organization achieves, the better you will look when vying for a DoD contract. Here’s a closer look at what they are.   Read more

CMMC Is Complex, But You Need It If You Want to Do Business.

By Erik Briceno

CMMC Is Complex, But You Need It If You Want to Do Business

You have probably heard about Cybersecurity Maturity Model Certification lately, especially while looking for work in the Federal system. In a previous article, we talked a little about a new set of standards to meet in addition to NIST. As we mentioned, Cybersecurity Maturity Model Certification, or CMMC, is basically an extension of NIST 800-171. Today we’re going to go into a little more detail on what’s involved in meeting CMMC compliance and how V2 Systems can help you achieve certification.   Read more

Managed Security Service Providers Are More Important Now Than Ever

By Erik Briceno

Managed Security Service Providers Are More Important Now Than Ever

According to Market Watch, there has been a continuous growth in the Managed Security Service Provider (MSSP) market in the last five years. This growth trend is expected to continue further into the future, projected at least as far as 2023. There is absolutely no reason to assume this trend will not be maintained indefinitely, much further into the future.

There are a few important reasons why you should consider using an MSSP, and why V2 Systems will continue to be your most valuable partner in all things related to technology.   Read more

At V2 Systems, We Use Cisco Umbrella. You Should, Too.

By Erik Briceno

At V2 Systems, We Use Cisco Umbrella. You Should, Too.

Are you familiar with Cisco and their many products? If you use our services, you might be surprised to know that we use Cisco Umbrella to help keep you safe. Let’s take a closer look at what Cisco Umbrella is, and how we utilize it to help keep your business secure from outside threats. What makes this product superior to others on the market?

It’s certainly not the only tool in our arsenal, but it’s definitely a good one. Here’s a more in-depth look at this full suite of detection and protection.   Read more

In-House Security Training: Knowledge That Everyone Should Know

By Erik Briceno

In-House Security Training: Knowledge That Everyone Should Know

Being a security-minded company means having in-house staff that are properly trained in being security-minded. Although Cybersecurity Awareness Month may be ending, it is always in your organization’s best interest to maintain vigilance — not just one month out of the year.

While hiring a managed security service provider is a critical first step, cybersecurity awareness certainly doesn’t end there and depends on everyone who works for you being informed and educated on this subject. To that end, let us explain how in-house cybersecurity training is something you should consider doing.   Read more

Seriously, Please Stop Using Internet Explorer

By Erik Briceno

Seriously, Please Stop Using Internet Explorer

On our social media feed, we’ve posted about the dangers of using Internet Explorer — the depreciated web browser from Microsoft’s bygone age — more times than an IT service should probably have to. Unfortunately, there are many businesses of all sizes who still utilize it or rely on its architecture, and it’s something we all really need to start moving past. A recent discovery involving the browser is just one of nearly countless examples.   Read more

NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?

By Erik Briceno

NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?

The National Institute of Standards and Technology, more commonly referred to as NIST, puts out extremely important guidelines to follow, and we have covered those guidelines at length in past articles. However, there have been quite a few changes since we last wrote about them. Today, we’re putting out a refresher on the subject for readers who are unfamiliar with NIST compliance, as well as sources for some of the more recent, important updates to NIST standards.   Read more

Yes, Data Breaches Are Still a Thing

By Erik Briceno

Yes, Data Breaches Are Still a Thing

Ransomware may have been dominating the news cycle over the last couple of months, but data breaches are also occurring at a similar frequency. To this day, we’re still feeling the fallout from the Equifax breach, even though that was all the way back in May of 2017.

While we’re still dealing with the consequences from that, what’s been happening since then? Glad you asked. Let’s take a look.   Read more

By Erik Briceno

“Please Patch Your Windows. Pretty Please?” – Microsoft

Do you remember WannaCry? Two years ago, it was arguably the most destructive cyberworm in history — shutting down hospitals, banks, transportation and shipping companies. Perhaps one of the most baffling things of all, though, is the fact that WannaCry didn’t exist until two months AFTER Microsoft had already released a patch that would fix the very vulnerability the worm took advantage of.

Now, in 2019, the same thing is happening again with a vulnerability known as BlueKeep. This security risk is so severe that not only did Microsoft update Windows 10, they even went out of their way to patch its depreciated operating systems: Windows 2003, Windows XP and Windows Vista.   Read more

1 2 3 4
Zoom Has Touched Up Its Security. Will You Benefit From It?
The 5 Levels of CMMC
The 5 Levels of CMMC
CMMC Is Complex, But You Need It If You Want to Do Business.
CMMC Is Complex, But You Need It If You Want to Do Business
Managed Security Service Providers Are More Important Now Than Ever
Managed Security Service Providers Are More Important Now Than Ever
At V2 Systems, We Use Cisco Umbrella. You Should, Too.
At V2 Systems, We Use Cisco Umbrella. You Should, Too.
In-House Security Training: Knowledge That Everyone Should Know
In-House Security Training: Knowledge That Everyone Should Know
Seriously, Please Stop Using Internet Explorer
Seriously, Please Stop Using Internet Explorer
NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?
NIST SP 800-171 Is Now More Important Than Ever: Are You Following the Framework?
Yes, Data Breaches Are Still a Thing
Yes, Data Breaches Are Still a Thing
“Please Patch Your Windows. Pretty Please?” – Microsoft