Managed Cybersecurity Services

As a small business owner, you have a lot on your plate. You’re trying to run your business, manage your employees, and deal with customers all while trying to stay ahead of the competition. In today’s digital age, technology plays a vital role in the success of a small business. While managing your own IT […]

2022 ISC2 Cybersecurity Workforce Report

(ISC)² has just released the 2022 Cybersecurity Workforce Study. This year, (ISC)² interviewed 11,779 cybersecurity professionals worldwide. Key Insights from Study Participants: 75% report strong job satisfaction, yet 70% still feel overworked Only 28% report their organization actively listens and values their input 55% believe diversity will increase among their teams within two years 20% […]

Meet Ryan Biswas – Cybersecurity Intern

My name is Ryan Biswas. I am a Senior at George Mason University majoring in Information Technology with a concentration in Cybersecurity. I’m currently working on installing a Windows server. When fully deployed, it will help keep the systems here at Total Cyber Solutions organized, managed, and updated. After installing the server, there are various […]

Meet Jason Sanchez – Mobile Application Development Intern

Hi, my name is Jason Sanchez and I’m a non-traditional first generation Bolivian American college student from George Mason University. I want to welcome you to this part of the website and to my personal blog section. This week I’ll start everything off by discussing a favorite method of learning that I picked up a […]

Meet Yasin Yahye – Cybersecurity Intern

Hello! I’m Yasin Yahye and currently a senior in George Mason. There are a number of things I did when I started working as an intern in Total Cyber Solutions. Ranging from making CAT cables to learning how to use our Intrusion Detection System (IDS), Security Onion.  The main thing I’ve learned while working here […]

Meet Markus Smith – Information Security Intern

Hello, my name is Markus Smith, and I am the Information Security intern at Total Cyber Solutions (TCS). I primarily assist the Information Systems Security Officer (ISSO) by managing our systems’ security and ensuring we comply with NIST SP 800-171 and the Cybersecurity Maturity Model Certification (CMMC) v2. These frameworks aim to help businesses manage […]

DoD Releases New Policy on Social Media

The DoD has recently released a department wide policy regarding social media use for official accounts. DODI 5400.17 provides guidance for social media use within DoD, records management procedures, and guidance to ensure personal social media accounts are not misrepresented or misinterpreted as official accounts. This is significant because this is the first DOD policy […]

Cyber threats on the rise

The US Government has warned of an increased threat of cyberattacks. The Cybersecurity and Infrastructure Security Agency (CISA) has released recommendations to help keep you and your family safe and secure. Here are a few simple steps everyone can take to improve their cyber hygiene and better protect themselves online. Use Strong Passwords Having a […]

Cybersecurity Maturity Model Certification (CMMC): What You Need to Know

Cybersecurity threats are on the rise, small and medium sized businesses are more vulnerable than ever before. Vulnerability Analysis is needed in today’s business to help protect valuable data. CMMC assessments assist government contractors in securing controlled unclassified information (CUI) in their organizations. Table of Contents Defining a Maturity Model Maturity models are modeling tools […]