614-322-2222 or 877-770-8324

Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House

Aug

26

Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House

Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House

From Charles Robbins

ISO 31000 - Risk management

August 25, 2021

As we have stated multiple times since the meeting between President Biden and President Putin, national defense for cybersecurity is on us. Yesterday, Apple, Amazon, IBM, Microsoft, and Google pledged to strengthen their stance on cybersecurity at the White House. Especially in enforcing the cyber weakness in their Supply Chain. As you know, OEM and IT support in Ohio and the US is made up mostly of non-compliant third-party vendors. So maybe now, these large corporations along with government agencies are going to require NIST CSF compliance similar as the DoD CMMC plan. We will see. However, you may realize that your own organization might be behind the times.

When you incorporate the Zero Trust Security Model in your planning, every effort forward will result in user sign on using MFA and with the least privileges being granted. Department personnel can help identify user accounts to be deactivated, endpoint devices that should not allow access and way too much free contact to the open Internet. When people learn at work, they can practice their cyber hygiene at home. Therefore, you can do two things to start today, compliant partners, and CSF training that results in proactive change. These steps will help your business and the US cyber defense.

ISO 31000 certified TechR2 is able to conduct assessments for any organization that meet the ISO and NIST requirements.



  • Providing complete “Cradle to Grave” data eradication solutions, sound experience, industry best practices and resources to support you.


  • About An Industry Leader

    TechR2 is the only company in the industry that has earned a US patent for its Track-Contain-Destroy-Verify data security process, is OEM approved, upholds critical ISO certifications, and is recognized for compliance with GDPR, NIST and all governmental regulations concerning data destruction, including ISO 27001, ISO 14001, ISO 9001, and ISO 45001.


  • Why risk it? Get started today!
    Call 614-322-2222 or use this form.