Skip to main content

Blog

Internetwork Engineering

Want to learn more about network consulting and all things Information Technology? Follow our blog for up-to-date insights and information.

Jason Smith

Jason Smith is the Security Consultant for Internetwork Engineering (IE) with over 15 years experience in IT & IT Security, including finance, retail, and aerospace and defense. Connect with Jason on LinkedIn.

Blog Feature

IT Consulting

By: Jason Smith
April 3rd, 2025

In 2025, the landscape of cybersecurity compliance for government contractors is evolving rapidly, and the shift from the System for Award Management (SAM) Supplier Performance Risk System (SPRS) to the Cybersecurity Maturity Model Certification (CMMC) Level 1 is one of the most notable changes. This transition marks a significant milestone in strengthening the security posture of the U.S. Department of Defense (DoD) supply chain, and it comes with new requirements that contractors must understand to stay compliant and continue doing business with the federal government. We’re going to dive into the key elements of this shift and what contractors need to know to successfully navigate the transition.

Blog Feature

Data Protection | Cybersecurity | IT Strategy

By: Jason Smith
February 20th, 2025

Now that we’ve entered 2025, the cybersecurity landscape is evolving at a rapid pace. With the expansion of digital technologies, the rise of new threats, and the increasing reliance on cloud infrastructure and remote work, companies must rethink how they approach cybersecurity. It’s become clear that one-size-fits-all security solutions are no longer sufficient, adaptability is key.

Blog Feature

Data Protection | Cybersecurity

By: Jason Smith
September 12th, 2024

Data flow mapping can be a game-changer when it comes to building and maintaining a robust cybersecurity posture. Here are some key benefits:

Blog Feature

Cybersecurity | IT Consulting | IT Strategy

By: Jason Smith
August 15th, 2024

In today’s digital landscape, the alignment of business goals with IT strategy is crucial for organizations aiming to leverage technology effectively while maintaining a secure operational environment. Businesses must ensure that their IT initiatives are not only supportive of strategic objectives but also resilient against emerging cyber threats. By harmonizing these elements, companies can achieve a cohesive approach that enhances operational efficiency, drives innovation, and safeguards sensitive data.

Blog Feature

Cybersecurity

By: Jason Smith
June 26th, 2024

This year (2024), the United States Securities and Exchange Commission (SEC) is set to implement a new cybersecurity rule that will bring significant changes to the way companies report their cyber-related incidents and risks. This rule aims to standardize disclosures, ensuring that investors receive consistent and comprehensive information about cybersecurity practices and breaches. Companies will need to closely examine their cybersecurity policies, incident response plans, and reporting mechanisms to align with the forthcoming regulatory expectations.

Blog Feature

Data Protection | Cybersecurity

By: Jason Smith
May 23rd, 2024

2024 has brought big changes in cyber insurance trends. I’ve compiled some of the most prominent ones I’ve seen this year so far to help you get the most out of your coverage, plan accordingly for potential cyber risks, and take advantage of available tools that will help you succeed in protecting your business assets.