Blog

Blog

The security of our nation’s critical infrastructure has never been more imperative. As partners to our clients in the Defense Industrial Base (DIB) and critical infrastructure, we understand the critical role we play in national security. Our commitment extends beyond compliance; we are dedicated to proactive collaboration and advanced cybersecurity measures. In line with this commitment, we are proud to announce our partnership with Dragos, Inc., a leader in industrial cybersecurity.

Partnership with Dragos, Inc.

Through our partnership with Dragos, Inc., we aim to leverage their expertise in industrial control systems (ICS) and operational technology (OT) cybersecurity. Dragos brings unparalleled capabilities in threat detection, incident response, and vulnerability management tailored for critical infrastructure. This collaboration enhances our ability to provide our clients with the most advanced security solutions, ensuring that their operations remain secure and resilient against emerging threats.

The Dragos Platform received the 2023 SC Award for Best Industrial Security Solution for its ability to help organizations identify their OT assets, manage vulnerabilities, and detect and respond to threats that target industrial control systems. In June, Dragos was named Best Incident Response Solution by SC Awards Europe. 

Through this partnership, MNS Group gains the benefits of the Dragos Global Partner Program, the only channel program to comprise OT cybersecurity technology, services, and threat intelligence supported by training that prepares partners as OT cybersecurity experts. The program helps develop and advance resellers as ICS/OT cybersecurity experts and advisors with the full spectrum of OT cybersecurity offerings in their portfolios

MITRE’s Call to Action

Recent insights from MITRE highlight the escalating threats posed by cyberattacks, particularly from nation-state actors such as the Chinese Communist Party (CCP), targeting essential services like energy, transportation, communications, and water systems. This environment necessitates robust measures and innovative solutions to ensure resilience and operational continuity.

MITRE ​ has been vocal about the need for the U.S. government to intensify efforts to safeguard critical infrastructure. A recent MITRE-Harris poll underscores the public’s concern, with 81% of respondents expressing worry over the security of vital services, and 78% believing that the federal government bears full or partial responsibility for fortifying these infrastructures. MITRE’s leadership emphasizes that the threat landscape has evolved significantly, requiring a shift from incremental improvements to comprehensive, coordinated responses involving both public and private sectors​.

Proactive Measures and Client Support

We are dedicated to supporting our clients by:

Implementing Advanced Security Protocols: Utilizing the latest technologies and best practices in cybersecurity to protect against sophisticated attacks.

Continuous Monitoring and Threat Intelligence: Providing real-time monitoring and actionable intelligence to preemptively address potential threats.

Training and Awareness Programs: Educating our clients on the latest cyber threats and best practices to maintain robust security postures.

Incident Response and Recovery: Ensuring swift and effective response to any cyber incidents, minimizing downtime and operational impact.

Looking Ahead

As threats to critical infrastructure continue to evolve, so must our strategies and partnerships. We remain committed to collaborating with industry leaders like Dragos, Inc., and aligning with MITRE’s recommendations to enhance our collective resilience. By fostering a culture of security and innovation, we aim to protect the vital services that underpin our nation’s security and prosperity.

For more insights into how we are working to secure critical infrastructure and our strategic partnerships, stay tuned to our updates and reach out to our team for more information.

read more

Small and medium businesses (SMBs), defined as those with under $25 million in annual revenue, are the economic backbone on which our nation depends. Every state in the union and members of every community have a vested interest in and depend on the success of small and medium businesses. To plan for success, businesses utilize forecasting. Forecasting employs past data to make educated predictions about future trends. Companies use this method to decide on budget allocation or prepare for expected costs in upcoming periods, usually influenced by the anticipated demand for their products and services.

How important is forecasting for SMBs to our nation’s overall economic health and security? Very. This is emphasized further when the focus is narrowed to GovCon SMBs. Their success- or failure- is shared and felt among our nation’s citizens. 

“Above all, the forecaster’s task is to map uncertainty, for in a world where our actions in the present influence the future, uncertainty is opportunity.” Paul Saffo 

Events over the last several years have allowed ample opportunity for business managers and executives to navigate uncertainty. Indeed, even the concept of certainty seems quaint among GovCons when the US has lost 30% of its defense industrial base (DIB) over the last 10 years, as shared by Isabella Guzman, administrator for the U.S. Small Business Administration (SBA). Forecasting for non-GovCons may include Sales Revenue, Cost of Goods Sold (COGS), Gross Margin, Operating Expenses, Interest and Tax Expenses, Capital Expenditures, Inventory Levels, Accounts Receivable and Payable, Cash Flow, Market Trends and Economic Conditions, Workforce Needs, New Projects and Investments, Break-even and Risk Analysis.

There are abundant challenges for GovCons to consider when forecasting in addition to the lengthy list above that are unique to them due to specific operational, regulatory, and financial environments:

Regulatory Compliance and Changes: GovCons must anticipate and plan for changes in government regulations, which can affect everything from contract bidding to execution. 

Budget Cycles and Funding Fluctuations: Government budgets are subject to political processes and fiscal cycles, leading to fluctuations in funding availability. They must have an understanding of the government’s budgeting process, the timing of appropriations and the (frustrating) potential for shutdowns.

Contract Types and Payment Schedules: GovCons deal with a variety of contract types (e.g., fixed-price, cost-reimbursement, time-and-materials) each with its own financial and performance risks. Forecasting must account for the specifics of these contracts, including payment schedules, performance milestones, and risk of adjustments.

Bid and Proposal Efforts: Forecasting in GovCons must include the costs and timelines associated with preparing bids and proposals, as well as the probability of winning contracts. 

Long-term Contracts and Lifecycle Management: Many government contracts are for long-term projects that can span several years. Forecasting needs to account for the lifecycle management of these contracts, including potential modifications, maintenance, and operational support.

Security Clearances and Classified Work: Projects requiring security clearances or involving classified information add layers of complexity to forecasting. This includes considerations for personnel clearances, secure facilities, and IT infrastructure.

Public-Private Partnerships and Joint Ventures: GovCons often engage in public-private partnerships or form joint ventures to pursue contracts. Forecasting must consider the dynamics and obligations of these partnerships, including shared risks and revenues.

Market and Political Environment: The demand for government contracting services can be influenced by political priorities, geopolitical events, and changes in policy. Forecasting in this sector requires a deep understanding of these external factors and their potential impact on contract opportunities.

Technology Adoption and Innovation Cycles: Government contracts may involve cutting-edge technology or require adherence to specific technical standards. Forecasting must factor in the costs and timelines for research and development, technology adoption, and potential innovation cycles.

Don’t Miss the Shifts 

Are there additional critical areas that GovCon’s should track into the future for their businesses to succeed in a climate of such uncertainty for sake of national security? Yes. As a business that provides compliance, information technology, and business consulting, we have insight into some areas that should be tracked now by GovCons that are often missed.

Survey Says: GovCons are Up at Night

In truth, executives are kept up at night by several issues regarding their companies that are unique to GovCon businesses. The GAUGE 2023 Report, by Unanet and CohnReznick, gathers information from 1,180 survey responses from a variety of government contracting professionals. 60% of respondents were in a C-Suite or Controller role, and more than half of the respondents were small and mid-sized businesses.

read more

If your business is not a member of the Defense Industrial Base (DIB), and you don’t do work on a contract basis as part of the supply chain to the Department of Defense, you can stop reading now. Seriously. Despite the article’s title, this missive is full of acronyms and explanations of compliance requirements and has nothing to do with breakfast. And did I mention acronyms? I will wait.

Okay, since it is just “us” now, I will share a few high-importance details from the proposed CMMC rule, and specifically how you will work with companies like mine. Managed Services Providers (MSPs), Managed Security Service Providers (MSSPs), and other external service providers (ESPs) have been included in the CMMC fray, and it will impact your business.

Answered questions, with a side of questions

Over the last several years, we have had a lot of questions concerning our clients’ obligations because of the coming Cybersecurity Maturity Model Certification (CMMC). At long last, many of those questions are getting answered; the DoD released the proposed rule on December 26, 2023. 

CMMC is the verification mechanism through which the DoD is assured that the contractors and subcontractors they work with have information systems in place to protect the sensitive data they hold. It was created because the DoD discovered that many operational and cybersecurity practices within the DIB were weak making our nation vulnerable to attack. The CMMC rule closes loopholes that have allowed plans of action purposed to remediate the weaknesses to remain open for long periods of time. 

Most of our questions have been regarding the more advanced cybersecurity and operational requirements for DIB businesses that process, store, or transmit Controlled Unclassified Information (CUI) and who will need to secure a CMMC Assessment provided by an authorized CMMC Third Party Assessment Organization (C3PAO) at Level 2. Level 1 DIB businesses are required to protect Federal Contract Information (FCI) and are allowed to sell-assess their environment. Both levels 1 and 2 require that a company executive sign an affirmation that they have accurately assessed and are operating under the controls. 

The significant update is that businesses classified as Level 1 and Level 2 in the Defense Industrial Base (DIB) sector will face upcoming challenges related to choosing their service providers.

It turns out, the DoD references many of the functions that MSPs perform within the definition of an External Service Provider: “external people, technology… that an organization utilizes for provision and management of comprehensive IT and/or cybersecurity services… CUI or Security Protection Data (e.g., log data, configuration data) must be processed, stored, or transmitted on the ESP assets to be considered an ESP.”

Accordingly, we, the MSPs and MSSPs of the world that serve the DIB, will need to achieve our CMMC certification too! Not only that, but any ESP will need to certify at or above the level of the contractor they support is required to certify. While we have been expecting this and implementing the requirements in our own business, most MSPs or other ESPs have not.  

Why does this matter to you? When your company uses an MSP or other external service providers, they are included as “in scope” for your organization’s System Security Plan; they will be included in your assessment. Meaning- you can’t pass your CMMC Assessment unless and until your ESP has passed their assessment and have a final certification as your provider.  You will not be able to work for the DoD until all your ESPs have their certification. Let’s just say, there is some debate on how this chicken-and-egg-timing will work itself out… and there are still other considerations as far as timing. 

This also means that your team will need to carefully vet the capabilities of every external service provider hired to work for you… and their tools.

read more

At long last, the CMMC proposed rule will be released on December 26, 2023! 

If you have not prepared to pass the CMMC Assessment, there is no time like the present! (And if we may be so bold, we suggest preparing for the journey with some music to get you in the right frame of mind!)

Where does a contractor in the Defense Industrial Base start?

Rally the troops, and choose a leader: CMMC compliance is a team effort. A common misconception of the CMMC program is that it contains all technical controls and requires little coordination with staff not directly involved with IT. However, the CMMC program controls involve much more than technical configurations: human resources, building security, administration and operations, accounting, and even external service and cloud providers may be inscope. 

Leadership starts at the top. Management must make clear that conforming to the requirements of CMMC is a priority. Kick off an all-hands meeting to align and educate the entire organization and include goals, defined roles and responsibilities, and communication channels. It is key to have one person designated to serve as the lead to coordinate your team’s efforts. In one company that MNS Group works with, the head of business development led the compliance implementation for the company. Why that role to lead the effort? Lost opportunity. This individual had a lot to lose if the company did not become compliant in time to win the contracts that provided the bulk of his department’s income, and he possessed the skills to educate, encourage, and track the various departments to contributions. Whoever in your organization secures the honor, they will require the support of the management team.

The good news is that if you are working with MNS Group, we are able to assist your team with our CMMC Certified Professionals and Assessors (CCPs and CCAs), with implementation and support toward compliance.

Determine the level you need to comply with.

Your contract and the type of information your company handles determines the level and number of controls your organization must meet. Every defense contractor will need to meet at minimum Level 1. The CMMC 2.0 model consists of three distinct levels, each representing a different set of cybersecurity practices and processes:

Level 1 – Foundational: This level is focused on the protection of Federal Contract Information (FCI) and encompasses the basic safeguarding requirements for this information as outlined in Federal Acquisition Regulation (FAR) 52.204-21. It includes 17 practices that are fundamental to cybersecurity, largely aligning with basic cyber hygiene practices. At this level, companies are required to perform annual self-assessments.

Level 2 – Advanced: Level 2 aligns with the protection of Controlled Unclassified Information (CUI) and is based on a subset of the security requirements specified in NIST SP 800-171. Level 2 applies to you if your company handles CUI; you are already subject to DFARS 252.204-7012 requirements and have been since late 2017. This level includes a total of 110 practices and focuses on the implementation of intermediate cyber hygiene practices to protect CUI. Level 2 requires companies to undergo an independent third-party assessment every three years to ensure compliance.

Level 3 – Expert: This level is intended for companies that are part of the defense industrial base and are handling critical national security information. Level 3 is based on a subset of the security requirements from NIST SP 800-172, along with additional practices and processes from other sources to protect CUI and reduce the risk from Advanced Persistent Threats (APTs). Compliance with Level 3 requires a government-led assessment every three years. The final rule is expected to have greater detail on this level.

Target your efforts based on the level at which your organization must comply. 

Scoping

If your company handles, creates, stores, or transmits CUI- who handles it? Where is it accessed, processed, or stored? The environment where CUI exists helps determine your scope. A System Security Plan (SSP) documents what controls are in place. The smaller the environment, the less expensive compliance efforts will be. Some companies find that an enclave for the CUI is a smart solution.

An enclave is a way for organizations to limit the endpoints that need to be secured, making compliance efforts more streamlined, resulting in less expensive and sometimes faster compliance. All contractors to the DoD will have Level 1 controls in-scope applied organization-wide, even if your CUI is confined to an enclave.

read more

There was never a task that was not enhanced by a great playlist! Achieving CMMC compliance is quite a journey! With 2024 on the horizon, it is a great time to rock out (with some humor) while making strides toward a stronger and more cyber-resilient company! Our team created a playlist to stream in the background. GO AHEAD- you deserve a little fun!

read more

As the finalization of the Cybersecurity Maturity Model Certification (CMMC) rule looms near, DoD contractors are on high alert. With CMMC 2.0, the Department of Defense (DoD) aims to streamline and strengthen cybersecurity requirements. This shift to a three-level model demands a strategic approach from contractors to ensure compliance and safeguard sensitive information.
Although the final CMMC rule has not been officially released yet, recent developments have brought significant updates. As of November 21, 2023, the Office of Information and Regulatory Affairs (OIRA) website shows an important change in the status of the eight components and the overarching Framework of the Cybersecurity Maturity Model Certification Program (CMMC). Previously marked as “Pending Review,” these elements have now been updated to “Consistent with Change.” This shift suggests that the CMMC program, along with its eight foundational policy elements, is advancing towards publication.

read more

Hurricanes, thunderstorms, and a reliance on air conditioning that taxes the power grids can cause outages and increase the risk of power surges. To prevent any potential damage from power surges, it’s essential that all your PCs or servers are connected to UPS devices. That’s the battery backup that kicks in during power outages. Check the integrity of your Uninterruptible Power Supply (UPS); make sure the light on the UPS is working properly. You can also unplug the UPS from the power source to see if it will still power your computer without external electricity.

Did you test and find the UPS is not working? Plan to replace the UPS as soon as possible. Simply power down and unplug your device before leaving for the day, especially if bad weather is expected. If you are one of our clients and need advice regarding a new UPS, just open a ticket via your portal or email and we will happily help you choose one!

Keep Connected with Your Hot Spot
Power outages often interrupt internet connectivity, even after the power returns! As a stopgap until service can be restored, consider using your phone as a hotspot to get connected and be able to work again.

Speaking of Heat….

read more

MNS Group is pleased to announce that it has received The Cyber AB’s accreditation to certify government contractors and commercial companies with CMMC compliance, strengthening its ability to deliver comprehensive CMMC services.

Overseen by the Department of Defense (DoD) and Cyber AB, the CMMC Accreditation Body, MNS Group successfully passed the CMMC Level 2 assessment administered by the Defense Contract Management Agency (DCMA) Defense Industrial Base Cybersecurity Assessment Center (DIBCAC), meeting all CMMC Third-Party Assessment Organization (C3PAO) requirements.

Developed by the DoD, The Cybersecurity Maturity Model Certification (CMMC) program is designed to enforce the protection of sensitive unclassified information that is shared by the DoD with its contractors and subcontractors in the Defense Industrial Base (DIB). CMMC will require third-party evaluation to determine whether a contractor is fit to do business with the DoD and participate in the DIB. The Cyber AB established two non-governmental roles: the Registered Provider Organization (RPO) and the C3PAO. MNS Group has been an RPO since November 2020, assisting clients in their preparation to obtain their CMMC.

“With over 20 years of cybersecurity, technology, and business process experience, our team has been assisting members of the DIB to harden their cybersecurity posture and achieve CMMC compliance, and in doing so, strengthen our national security. Certifying as a third-party assessment organization was a natural next step. We look forward to our expanded role validating organizations seeking CMMC certification,” said Tobias Musser, CEO at MNS Group. “It is an honor to meet with DIB businesses and be allowed the opportunity to observe that they have met the tasks needed to secure the sensitive data entrusted to them, so they can get out there and win contracts.”

MNS Group is proud to be one of only forty CMMC C3PAOs accredited to April 29, 2023. It has CMMC Certified Assessors and Professionals on staff, as well as Registered Practitioners.

read more

The International Organization for Standardization does not derive its abbreviated name, ISO, from an acronym alone. Instead, ISO comes from the ancient Greek word ísos, which means equal or equivalent.

And that’s the underlying idea. The goal of the ISO is to provide common standards among countries. A consumer or client can be assured that a product or service that meets ISO certification is safe and of high quality. 

A quality management system (QMS) helps your company meet and maintain ISO standards. There’s even an ISO standard for QMS—ISO 9001—which is the most used QMS in the world.

ISO has developed more than twenty-four thousand international standards, and companies in all fields use them. These standards deal with IT and data security, environmental management, health and safety, and many other activities and products. One of the better-known standards, ISO 27001, deals with information security management.

After the standard is achieved, the QMS lives on and evolves to reflect your company’s changes. To achieve the benefits of and maintain the ISO certification, a commitment to “continual improvement” is required. A specific requirement of ISO 9001:2015 is “continual improvement” – this refers not only to a company’s products and services, but also to the QMS. The standard states: “The organization shall continually improve the suitability, adequacy and effectiveness of the Quality Management System. The organization shall consider the results of analysis and evaluation, and the outputs from management review, to determine if there are needs or opportunities that shall be addressed as part of continual improvement.”

At the end of the year, the company must submit a new assessment. Many companies hire a quality manager or assign an employee to assume the duties of quality management, but it can be difficult to evaluate your company objectively from within. Many companies do not have the budget or need a full-time dedicated employee. That’s why it pays to outsource your QMS after ISO 9001 certification to hands-on consultants who works with you throughout the year and can act on your behalf with the auditing body.

read more

When did the Sunday Scaries, the anxious dread that precedes the beginning of the work week begin for you? The calendar is full, the to-do list is over-populated, and leaders fill multiple roles leading to burnout and negativity. It is no wonder that the modern professional is not excited to jump out of bed on Monday. A single hire could change this for your organization. 

With such heavy workloads, energy toward creativity and out-of-the-box thinking is nil.  Business leaders need energy that allows traction toward working ON the business, and not just IN it – spinning plates and wearing so many hats. A technology consultant may be the answer to “smarten” your tech to work for you, so you can work on the business you (used) to love.  

What Is Technology Consulting? 

These days, a Technology Consultant does much more than manage printers, assist with helpdesk repairs, or install networks; after all, technology is woven into every aspect of business. A consultant serves as a sounding board from whom you can ask questions, who will learn about your business, your goals, and how you implement technology. A good Technology Consultant is NOT an IT consultant; they look at a much broader picture, identifying efficiencies in processes, assessing risk, controlling costs, and advising on compliance and liability. Delegating these roles to experts will help you get back to the work you enjoy and may even help profitability. 

A study by IBM and the Ponemon Institute found that the use of emerging technologies reduces costs. For example, the adoption of artificial intelligence, security analytics, and encryption saved companies up to $1.49 million compared to those who did not use these tools.  

read more