Is Your Company Prepared?
DID YOU KNOW?
61% of experts in technology and policy predict a major cyberattack causing widespread harm will occur by 2025, according to a Pew Research Center report.
$445 Billion is lost annually to cybercrime and espionage across the entire world economy, according to the Center for Strategic and International Studies.
46,605 breaches of federal computer networks occurred in 2013 according to the S. Computer Emergency Readiness Team.
Now do we have your attention?
One deadline has already passed. For Department of Defense, GSA and NASA Contractors:
All Department of Defense (DoD), General Services Administration (GSA) and NASA contractors must have met the Federal Acquisition Regulations (FAR) minimum cybersecurity standards as of December 31st, 2017. If you are not compliant, your company is at risk of losing federal contracts.
If you’re like many manufacturers, you may not know everything that is expected or even how to get started. To make this process easier, Purdue MEP has assembled a team of cybersecurity experts to help ensure you are compliant with the standards described in NIST Special Publication 800-171.
Purdue MEP’s experienced team has designed a comprehensive four-step cybersecurity program. This is intended to help you gauge your current situation, and then tailor a plan specifically for your company’s internal capabilities, budget, and time sensitivity.
Here are the steps in the process:
STEP 1: DISCOVERY – an assessment of your company’s practices related to the new standard. If necessary, a gap analysis will be completed to document the scope to be remediated.
STEP 2: REMEDIATE TO MEET NEW STANDARD – supports all fixes necessary for compliance. Sample work could include updating firewalls, patches, policy development, employee training, physical security, network configuration, etc.
STEP 3: TEST AND VALIDATE – verifies all technology and physical security aspects are working properly.
STEP 4: MONITORING/REPORTING – establishes ongoing monitoring and scanning of the required enterprise network. Creates a working process to log, remediate, and report (as required) cyberattacks.
DON’T RISK BEING UNPREPARED. CALL TO SEE HOW WE CAN HELP.