TechR2

Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House

About Data Security,About TechR2,Home Page,News,Press Release,TechR2 Blog

[vc_row type=”grid” video_bg=””][vc_column width=”2/3″ dp_animation=””][vc_column_text dp_animation=””]

Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House

[/vc_column_text][/vc_column][vc_column width=”1/3″ dp_animation=””][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]From Charles Robbins[/vc_column_text][space size=”30″][vc_single_image image=”14248″ img_size=”medium” alignment=”center” dp_animation=””][/vc_column][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]August 25, 2021

As we have stated multiple times since the meeting between President Biden and President Putin, national defense for cybersecurity is on us. Yesterday, Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House. Especially in enforcing the cyber weakness in their Supply Chain. As you know, OEM and IT support in Ohio and the US is made up mostly of non-compliant third-party vendors. So maybe now, these large corporations along with government agencies are going to require NIST CSF compliance similar as the DoD CMMC plan. We will see. However, you may realize that your own organization might be behind the times.[/vc_column_text][/vc_column][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]When you incorporate the Zero Trust Security Model in your planning, every effort forward will result in user sign on using MFA and with the least privileges being granted. Department personnel can help identify user accounts to be deactivated, endpoint devices that should not allow access and way too much free contact to the open Internet. When people learn at work, they can practice their cyber hygiene at home. Therefore, you can do two things to start today, compliant partners, and CSF training that results in proactive change. These steps will help your business and the US cyber defense.[/vc_column_text][vc_separator css=”.vc_custom_1629903638689{padding-top: 18px !important;padding-bottom: 24px !important;}”][vc_column_text dp_animation=””]Related article: Google, Microsoft plan to spend billions on cybersecurity after meeting with Biden (cnbc.com)[/vc_column_text][vc_empty_space][vc_column_text dp_animation=””]

ISO 31000 certified TechR2 is able to conduct assessments for any organization that meet the ISO and NIST requirements.

[/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

Tags :
Share This :

Recent Posts