Welcome to the First Column IT Tech Blog

Metro DC DoD Contractors - CMMC 2.0 NIST 800-171 Audit & Certification

Metro DC DoD Contractors - CMMC 2.0 NIST 800-171 Audit & Certification

November 11, 2022

 Outsource the CMMC Compliance Process - Audits, Certifications, Consultations

“Every organization that does business with the Department of Defense (DoD) will be required to be certified to the appropriate cybersecurity level before bidding on a contract or subcontracting to a prime. CMMC 2.0 is expected to go into effect in May 2023 and be in contracts by July 2023. Are you ready?” 

Since September 2020, all DoD contractors have been required to be CMMC NIST 800-171 certified (Cybersecurity Maturity Model Certification) to bid on many contracts. Uncertified contractors will not be able to hold existing DoD contract or acquire new DoD contracts. We assist contactors in the DC, Virginia, and Maryland area (DMV/NOVA) to become CMMC 2.0 NIST 800-171 compliant.  

New CMCC 2.0 Requirements

In November 2021 DoD released a new streamlined CMMC 2.0 model. The new program focuses on reducing costs and aligning cybersecurity requirements. They reduced the number of CMMC levels from 5 to 3.  This simplification is helping to streamline the assessment and auditing process.  

Prepare for - and Pass - your Audit to Receive CMMC Certification

There will be 3 levels of the in the new CMMC 2.0 each with different security controls. All contractors and sub-contractors will need to demonstrate they meet the appropriate cybersecurity level to receive a CMMC certification. If your company ever touches FCI (Federal Contract Information) or CUI (Controlled Unclassified Information), your company will fall under the new CMMC 2.0 Level 2 standards.  First Column IT is an independent contractor based in Manassas Virginia that will get your company ready to be audited and assist in your certification and audit process. As a Managed Security Service Provider (MSSP) we will guide your team through every step, to make it a seamless process. These basic steps include gap analysis, create a remediation plan, monitoring and reporting, produce documentation stating your companies SOP’s and SSP’s, showing how your company meets compliance, and then also consult during the audit process.  

·      CMMC assessments in the DC Metro area - free consultations

·      Automated assessment and evidence-collection platform

·      Plans of Action and Milestones (POAMs) assistance

·      Simplify CMMC & NIST 800-171 requirements

·      DoD cyber security training

·      Prepare for and pass your CMMC audit – all levels

·      Cyber compliance remediation services

·      Outsourced MSSP for small and medium sized contractors

·      Co-managed CMMC Assistance

·      Managed Compliance Service Available

·      FAQ’s click here https://www.acq.osd.mil/cmmc/about-us.html  

About First Column IT - Manassas Virginia

First Column IT has been serving government contractors the DC metro area for 20 years. Cybersecurity is a priority for any business, but for government and DoD contractors, it’s often mandatory.  We have IT consultants on staff that are CMMC Registered Practitioners and experts in the process of getting companies prepared for Cybersecurity Maturity Model Certification (CMMC) 2.0. Whether you are an in-house security officer that needs help with the technical implementation of the cybersecurity requirements necessary to keep your company compliant, or you are building your framework from the ground up, the knowledgeable IT professionals at First Column IT can help. Callus today to see how we can help you build a capable, flexible, and CMMC compliant IT infrastructure.

No items found.
Previous Post
March 1, 2024
The Dos and Don’ts of Smartphone Use for Business
Today, we encounter situations in business where digital communication is preferred by many people, and as a result, the use of smartphones to conduct business has become more common. With this shift in the way people do business, there are several considerations that the modern worker has to navigate to properly use smartphones to their advantage. Let’s take a look at a few in today’s blog. 
February 28, 2024
New Variant of XLoader Malware Runs in the Background and Steals Your Photos, Texts, and Other Data
If you’re in the know about cybersecurity and, specifically, mobile malware, you might have heard the name XLoader in the past. The malware has gone through considerable versions and variations, allowing it to steal information from users in more than seven countries, but the most recent is incredibly scary.
February 26, 2024
Who Has Your Data and What Are They Doing With It?
Protecting personal data has become a critical concern as more and more people use Internet-connected accounts. While this tech has undoubtedly enriched our lives, it has also paved the way for unprecedented invasions of privacy, particularly by enormous technology companies that claim to be doing it for their own good. Today, we will explore how these giants compromise data privacy, raising questions about the balance between innovation and safeguarding our most sensitive information.

Have a project in mind?

Start with our free consultation for VA, DC and MD companies. We will provide a detailed proposal and firm quote based on your specific IT support needs. All at a predictable monthly cost per seat.
Free Consultation - Sign Up Here