Appalachia Technologies Blog

Appalachia Technologies team is comprised of a diverse mix of IT professionals, some of whom have been on the forefront of IT since the industry’s inception. Through the years, our team has developed a wide array of experience in understanding individual needs and how they relate to your business.

PCI - The Credit Card Industry's Answer to Consumer Data Protection

People carry less cash in their wallets than they used to.  Even when going to the ice cream stand in the middle of summer, a debit or credit card is swiped instead of cash being tendered.  The reason for this is simple - it’s easier to swipe a card than it is to carry a load of cash in your wallet.  This has become an extremely convenient option over the years when making purchases.  However, as is often the case, convenience comes with risk.

Continue reading

The ABC's of Ransomware

Ransomware – The What, Where, and Why

Everyone has heard stories by now of an organization getting hit by ransomware.  From individuals to small and enterprise-level organizations, it can pop up anywhere and cause havoc.  What is it?  Where does it come from? Why isn’t it going away?  Today we’re going to break it down.

Continue reading

Top 8 Sources for Cybersecurity News

Not a single day goes by that we don’t either hear the word security or read the word security.  See?  You’ve already read it twice!  The internet is full of so much noise that it sometimes can be hard to filter out information that pertains to you and your organization, as well as what is credible.  Today I thought I’d take a moment to give you some great sources for security news.  These are sources that are very accurate and trustworthy.

Continue reading

Social Engineering: How Kind Humans Can Cause Big Breaches (appTECH TALK Ep. 6)

Humans are the smartest beings on earth.  So why is it that they are the number one cause for breaches that cost millions of dollars?  It’s because they are kind.

Because of the kindness of human beings, they are easily manipulated by bad actors to give up private information or even hold a door.  This is the foundation of Social Engineering.

Continue reading

What is a vCISO? (appTECH TALK Ep. 5)

Let’s face it.  Security is expensive.  Many organizations think of security as an unwanted expense when budgeting for the next fiscal year.  However, no matter what industry an organization is in, security IS its business too.

Continue reading

What is an Incident Response Plan (IRP)? (appTECH TALK Ep. 4)

Let’s face it.  If you haven’t had a security incident within your organization, you will.  Are you prepared?  An IRP is a plan or playbook that needs to be established and practiced on a normal basis.  When a breach happens, this is your playbook of who, how, and what steps to take to protect your organization and minimize impact. Let’s break down the steps of an Incident Response Plan (IRP). 

Continue reading

After a Penetration Test - The Road to Remediation (appTECH TALK Ep. 3)

Your company has been proactive in having a penetration test performed and you have the report in hand - so now what do we do with it?

Continue reading

What is Penetration Testing – Finding Vulnerabilities Before the Bad Guys Do (appTECH TALK Ep. 2)

If you are an organization with digital assets to protect, you’ve most likely heard the term Penetration Testing, also known as Pen Testing.  Penetration testing is the process used to find vulnerabilities and leverage them to hack an organization.

Continue reading

What is the NIST Cybersecurity Framework? (appTECH TALK Ep. 1)

Secure your Organization with the NIST Blueprint

Breaches are at all time high.  Over 50 billion devices are connected to the internet.  Some of them are secure, and some of them are not.  Which category does your organization fall into?

Continue reading

2021 Year in Review - Significant Cybersecurity Events

2021 Year in ReviewThe year is 2021.  We don’t have flying cars or robot maids, but nearly 5 billion souls worldwide are now connected to the Internet and to each other.  This is a beautiful thing and a remarkable feat of human ingenuity.  However, every rose has its thorn (to borrow from the great post-modern philosopher Bret Michaels) and to us who work in cybersecurity, 2021 was thornier than ever. 

Here is Appalachia’s 2021 Cybersecurity Year in Review!

 

Continue reading

What is MDM - Mobile Device Management?

What is MDM?

MDMMobile Device Management is software that allows companies to administrate mobile devices like smartphones or tablets. Many people are familiar with desktop PCs connected to a local domain. MDM is based on a similar idea, but MDM allows settings, apps, and content to be managed across different operating systems (like iOS or Android) and devices do not need to be connected to a local domain controller. Essentially, it allows companies to manage phones and tablets no matter where those devices are located.

Continue reading

Top 5 Security Assessment Findings

Top 5 Security Assessment Findings narrow smallest

Even organizations with solid cybersecurity programs will have findings from a security assessment.  After all, cyber attacks and attackers continue to learn and evolve, always trying to be one step ahead of their prospects.  Through our years of performing security assessments, here are the Top 5 areas that we have found to need remediation work post-assessment.

Continue reading

Ransomware: The ASCII Group Insight

ASCII Blog header v2

Appalachia is proud to be a member of The ASCII Group, a community for managed services providers, IT service providers, and managed security service providers.  Recently Jason McNew, Senior Engineer, Cybersecurity Risk & Compliance, was invited to contribute his experience and knowledge of ransomware, along with a few select members to help the ASCII community.

Continue reading

Adapting - How COVID Affected the Way We Work

Adapting...with a smile!

It’s early March 2020, and seemingly out of the blue, our personal and professional lives began to feel the subtle, and not-so-subtle effects, of COVID. Our personal lives aside and from a professional lens...things certainly looked and felt different. Nineteen months later, we’ve adapted, but we continue to feel the impact. Is this the new lens through which we’ll view our professional worlds? Time will tell, but the business lessons we’ve learned are more important than ever.

I’d like to take a minute and share the effects COVID has had on Appalachia Technologies...and how we continue to persevere and get better despite it!

Continue reading

SPRS Pt 2 - How to Enter an SPRS Score

In a previous blog post, we discussed how to calculate your SPRS (Supplier Performance Risk System) score in support of your CMMC (Cybersecurity Maturity Model Certification) efforts.  In that same blog, we also provided a free tool to help you calculate your SPRS score automatically.

In this follow-on blog, we’ll talk about how to provide your SPRS score to the DoD, which is a whole other chore once you’ve actually determined what your score is.  In order to access the part of the SPRS website where your score is uploaded, we first need a CAC (Common Access Card) or a DoD approved medium assurance ECA (External Certification Authority) certificate.  The primary purpose of this certificate is to ensure that the individual person entering the score is who they actually claim to be (non-repudiation), in addition to ensuring the confidentiality of the data.

Continue reading

Phishing for a Deal? A Black Friday Warning

The day after Thanksgiving, widely referred to as Black Friday, has marked the start of the Christmas shopping season since 1952.  Surprisingly, it wasn’t until 2012 that the Black Friday buzz was adapted to further stoke the shopping fire by promoting Cyber Monday.  Whether shoppers choose to chase the deals in person or from the privacy of their own homes, personal information is being shared in the form of email addresses, home addresses, and credit card numbers.  As the stores are preparing by stocking shelves and bulking up employee headcount, cyber criminals are also preparing to capitalize on the shopping frenzy, hoping to catch consumers with their guards down.

Continue reading

Everything That Is Wrong With CMMC 2.0

This month’s release of the much-anticipated CMMC 2.0 left many of us in the world of cybersecurity shaking our heads.  We have been working diligently with the defense industrial base for several years now, even before the CMMC was created, to stop the bleeding of our defense secrets to our adversaries.  As a veteran and a Patriot, I, along with many other Americans, take this very serious problem personally. 

Continue reading

Review of Verizon's 2021 Data Breach Investigations Report (DBIR)

One of the great “must reads” for us cybersecurity wonks is the annual DBIR (Data Breach and Incident Response), issued by Verizon every year since 2008.  While never dull, the DBIR is not a light read and comes in at a meaty 115 pages this year.  While we at Appalachia are delighted to stuff our horns with popcorn and study every last page, we realize that not everyone can make the time to fully digest this comprehensive treatise.  To that end, we have taken the time to write an executive summary of the DBIR for readers of our blog – because we care, and we don’t want you missing reruns or tee time.

This year’s DBIR is broken up into 8 major sections:  Introduction, Results and Analysis, Incident Classification Patterns, Industries, SMB, Regions, Wrap-up, and Appendices.  Let’s dig in by getting a sense of the sheer amount of work that the DBIR team puts in here:

Continue reading

We Salute...Our Veterans

We are extremely proud of the men and women in our organization who have served our country.  Coming from the Navy, Air Force, Marines, and Army, these members have taken their experiences in the military and applied it to their civilian careers.  To honor the veterans on our staff, I asked them to share - what they learned, their greatest achievement, their greatest challenge, and how we can step up to support our veterans.  Thank you, Mike, Nathalie, Jason, Derek, Joel, and Jason!

Continue reading

CSAM - Cybersecurity Toolkit

Blog 4 Graphics CS Toolkit graphic

I remember the first time my dad gave me a box of tools. I was moving out for the first time, and he gave me a box filled with an old hammer, two screwdrivers (one flathead, the other Phillips head), a rusty wrench, and a tape measure. It wasn’t much but it showed me that he wanted to make sure that I was ok. He gave me those tools so that I could fix any problems that came up in my time away from him. Well, I want to do the same for you but with cybersecurity. Now I’m not your father, but that doesn’t mean that I don’t want you to be safe online, and there are tons of tools online that can help you strengthen your cybersecurity.

Continue reading

News & Updates

APPALACHIA IN THE NEWS: Appalachia Technologies Cited in Case Study to Improve Efficiencies and Service Delivery   Improve and Evolve - this is one of the five Core Values of Appalachia Technologies and one we believe helps us to stay at the forefront of our industry.  Our Technical Assistance Center (TAC), while performing well and delivering quality service, was being challenged by processes for documentation that were manual and outdated.  Not satisfied with the current way of doing this, Chris Swecker, Manager of TAC, began to explore IT Glue.  IT Glue centralizes information, allowing for efficiencies in response time, accuracy, and client satisfaction.  As he explains, "IT Glue became our source of truth."  Chris and his team built on the success by incorporating additional tools to assist with password rotation and a client-side tool for password management and shared documentation.  

Contact Us

Learn more about what Appalachia Technologies can do for your business.

Appalachia Technologies
5000 Ritter Road Suite 104
Mechanicsburg, Pennsylvania 17055

Appalachia Technologies
  • About Us
  • IT Services
  • Compliance
  • Resources
  • Contact Us
  • Who We Serve
  • Speaker Request
  • (888) 277-8320