Security Insights

Join us as we navigate the complexities of the cybersecurity landscape and empower you with the knowledge to protect your digital world.

Contact Us

The Hidden Cyber War on Small Municipalities

As someone who’s spent years observing cybersecurity incidents unfold in local governments, we have seen firsthand how unprepared many small municipalities are for today’s digital threats. It’s no longer surprising when a city’s entire IT infrastructure goes down after a ransomware attack or when sensitive resident data is dumped online. What’s alarming is how preventable […]

MX2 Technology Achieves CMMC Level 2 Certification!

MX2 Technology has achieved Cybersecurity Maturity Model Certification (CMMC) Level 2 certification. MX2 passed the audit with a perfect 110 score, making it one of the first Managed Services Providers to achieve level 2 compliance. 

MX2 Technology Initiates CMMC Maturity Level 2 Assessment

Milpitas, California — Jan 14, 2025/PRWeb/ — MX2 Technology, an executive IT leadership firm and leader in providing Managed IT, Cybersecurity and Compliance solutions, announced today that the firm has initiated an assessment to become Cybersecurity Maturity Model Certification (CMMC) 2.0 Level 2 certified. The Department of Defense’s (DoD) CMMC 2.0 program establishes increased cybersecurity […]

Access Control – Top Mistakes: Access Control

Is your company making this quite common security mistake?  Addressing it now is both good business and a major step toward CMMC compliance It’s widely expected that CMMC 2.0’s final rules will come online in March 2023. If you are a contractor to the  DoD, you now have a rough deadline for compliance. If that […]

Training – Trojan Horse. Sometimes bad guys get lucky

When clients move their systems, data and infrastructure to the HITRUST Certified MX2 Platform, they are getting something more than just managed IT in a highly secure, compliant, and monitored environment. They are getting our knowledge as well.

Phishing – Supply chain attacks

Too smart to fall for phishing scams? Maybe so-but is everyone in your company? Throughout history, the human propensity to trust what they shouldn’t has always been the weak link of the security chain. Probably the best example of this is the story of the Trojan Horse-not the virus, but the original one. When thinking […]

Vulnerability Prototron Study – How a vulnerability assessment might have prevented the ransomware attack

Not long ago someone reached out to me and asked if I’d heard an interview with Dave Ryder, President of Prototron Circuits. It appeared, along with an article I wrote, in the January 2022 issue of SMT 007, devoted to cybersecurity. I’d followed the Prototron ransomware story, and I had heard Ryder’s “Lessons Learned” update. It’s compelling, and I urge you to listen to it as well.