Internetwork Engineering
Want to learn more about network consulting and all things Information Technology? Follow our blog for up-to-date insights and information.
By:
Jason Smith
April 3rd, 2025
In 2025, the landscape of cybersecurity compliance for government contractors is evolving rapidly, and the shift from the System for Award Management (SAM) Supplier Performance Risk System (SPRS) to the Cybersecurity Maturity Model Certification (CMMC) Level 1 is one of the most notable changes. This transition marks a significant milestone in strengthening the security posture of the U.S. Department of Defense (DoD) supply chain, and it comes with new requirements that contractors must understand to stay compliant and continue doing business with the federal government. We’re going to dive into the key elements of this shift and what contractors need to know to successfully navigate the transition.
Cybersecurity | IT Consulting | IT Strategy
By:
Jason Smith
August 15th, 2024
In today’s digital landscape, the alignment of business goals with IT strategy is crucial for organizations aiming to leverage technology effectively while maintaining a secure operational environment. Businesses must ensure that their IT initiatives are not only supportive of strategic objectives but also resilient against emerging cyber threats. By harmonizing these elements, companies can achieve a cohesive approach that enhances operational efficiency, drives innovation, and safeguards sensitive data.
Data Protection | IT Consulting
By:
Jason Smith
March 5th, 2024
Cybersecurity can be expensive, challenging, and often unrewarding. Cybersecurity and risk practitioners have faced challenges over the years to find the most effective metrics to show success and return on investment in cybersecurity efforts. Many organizations have taken a strategic approach and started to group security controls into programs. This approach provides those organizations the ability to share the holistic perspective and success, whereas it is more difficult to show success of an individual component. Data protection is one of those areas.
Data Protection | Cybersecurity | IT Consulting
By:
Jason Smith
October 5th, 2022
While there is no precise ‘how to’ guide on how to lower your cybersecurity insurance policy premiums because every single business is different, you can hedge the bets in your own favor. We’ve put together 4 tried and true best practices to help you up your chances of getting a more manageable cybersecurity insurance premium. Let’s review.
Network Access Control | Cybersecurity | IT Consulting
By:
Internetwork Engineering
May 24th, 2022
What Kind of Ransomware Protection is Required to Qualify for Most Cyber Policies?
By:
Internetwork Engineering
January 19th, 2018
Part Four Of a Five-Part Series We’ve been talking about the benefits of working with a partner versus a vendor for the past few months. Since then, we’ve discussed how a partner aligns their goals to your business’s needs, understands your industry, and invests time and trust in a way only a partner can. Here’s one other way a partner relationship beats working with a vendor, they’ll make sure you’re making the right investment. For instance, a few years ago I was working with a customer who wanted to add next-generation firewall services to their network. After investing months in the project, developing the design, documentation, and negotiating the best price from the manufacturer, the order was placed and engineers were due onsite within days. Everyone was excited; it was going to be a major improvement to their network. At the last-minute, word came down from the manufacturer, unofficially thru back-channels, that the product we had ordered was going to be discontinued in the next six months. What were we to do? What would a regular ole’ vendor do? I can tell you what a partner would do. They would put their customer’s needs first. So that’s what we did. We notified our customer, canceled the order, had our engineers stand down, and began to find the right solution once again. The replacement product had already been released, so once we verified it was stable, we redesigned the project from scratch, rewrote the documentation, and renegotiated with the manufacturer. Within a few weeks engineers were onsite and it went off without a hitch. From that experience, several benefits came to light.