Why Every Business Needs an Incident Response Plan

by EJ Phillips on Jan 6, 2025

Lessons from a Snowstorm: Ensuring Business Continuity Amidst Unexpected Events Like much of the East Coast, Virginia just got blanketed with snow. As my kids geared up for an extended day of Winter Break, I went into action.

Read Story

CMMC 2.0 Goes into Effect on December 16, 2024

by Stacy Aitken, CEO on Dec 10, 2024

The Cybersecurity Maturity Model, or CMMC, program has gone through some changes, but as we get closer to the rule being finalized, we wrote this short blog for anyone new to these requirements. You’ll learn about what the requirements are and what is coming down the pike.

Read Story

Topics: Compliance CMMC

Incident Response Plans

by Stacy Aitken, CEO on Nov 22, 2024

Ensuring Robust Cybersecurity Across Defense, Healthcare, Manufacturing, and Pharmaceutical Sectors Having a robust Incident Response Plan (IRP) is no longer optional—it's imperative. As a premier Managed Security Service Provider (MSSP), Dragnet’s mission is to deliver defense-grade …

Read Story

The Importance of Strong Passwords for Compliance

by Stacy Aitken, CEO on Oct 31, 2024

Protecting your data is more critical than ever. Not only is it good business to protect client data to retain their trust, for many industries, following proper cyber protocols is a requirement for compliance. With the increasing number of phishing attacks and data breaches, it's ess …

Read Story

Policies and Procedure Writing for CMMC Compliance

by Stacy Aitken, CEO on Oct 17, 2024

The CMMC model requires not only the presence of policies but also the implementation of corresponding technical controls and supporting documentation to demonstrate that the policies are actively enforced. Without this, organizations will likely fall short during an audit, putting th …

Read Story

CMMC: The Cybersecurity Maturity Model Certification

by Stacy Aitken, CEO on Oct 1, 2024

The Cybersecurity Maturity Model Certification (CMMC) is a major Department of Defense (DoD) program built to protect the defense industrial base (DIB) from increasingly frequent and complex cyber-attacks. It focuses on protecting important information that is not classified but still …

Read Story

Subscribe Here!