What is CFR 48? Your Guide to the New CMMC Rule

Big news! The amendment to the CFR 48 rule is out. The Department of Defense (DoD) has officially taken the next step toward fully implementing the Cybersecurity Maturity Model Certification (CMMC) program. With the release of the new CFR 48

Read More »

Your Operational CMMC Compliance Checklist

Achieving CMMC compliance isn’t just a documentation exercise. It requires a fully operational, security-first mindset across your systems, teams, and processes. Preparation often happens with your internal team or with a Registered Provider Organization (RPO). The certification itself is performed

Read More »

FIPS Validated Encryption

Throughout the CMMC Practices are references for using FIPS validated encryption to protect the storage and transmission of Controlled Unclassified Information (CUI).  If you search the CMMC Assessment Guide “FIPS-validated” comes up 22 times!  SC.3L2-3.13.11 specifically states that companies must

Read More »
Upcoming Events
Data Breach: Anatomy of One Company’s Response
If the trend continues, 2023 will become another year of over 1,000 publicly reported data breaches. According to the IT Governance Blog (itgovernance.co.uk), this translates to over five billion compromised data records. The breaches number will undoubtedly continue in number and severity – reaffirming that cybersecurity is a pressing priority for business. Learn More >

Monarch is the Northeast’s only Certified Third Party Assessment Organization (C3PAO)

Contact the Monarch ISC Team