Summer Camp

Blog

August 2020 Newsletter

Learn about free digital summer camps, how to select the laptop of your dreams, the latest on CMMC and our free monthly webinars - all in our August newsletter.
Kids online amazed at what they see!

Blog

July 2020 Newsletter

BEI's monthly newsletter includes help for parents trying to manage kids online during the summer, information about Risk Assessments, our lunchtime webinar series (Vacation or Staycation, it’s All About Securing Yourself is next), Excel Tips and Tricks and more!
Risk assessments are important to every business

Blog

What is a risk assessment and why do you need one?

How can your organization mitigate cybersecurity risk? The answer lies in risk assessments. Learn more about what they are and how they can help you.
Soup and Sandwich for Lunch

Blog

May 2020 Newsletter

BEI's monthly newsletter includes Mother's Day gift tips, our lunchtime webinar series (Microsoft Teams Tips and Tricks is next), BEI is again a Best Place to Work, IT Security during COVID-19, and more!
CMMC Level 2 Builds a Bridge to Level 3

Blog

CMMC Level 2 - Building a Bridge to Level 3

CMMC Level 2 introduces processes (maturity) to CMMC. It is bridge to Level 3 but requires a rigor and discipline that will server your organization well as you work business development efforts and long-term planning.
CMMC Level 1 Hurdle

Blog

CMMC Level 1 – Not a High Hurdle!

CMMC includes 17 capability domains and five (5) processes. …

Blog

Cybersecurity Maturity Model Certification Panel for Small Business GovCons

CMMC (Cybersecurity Maturity Model Certification) is coming and will quickly impact government contractors’ ability to respond to government opportunities. This panel discussion was sponsored by The Greater Reston Chamber of Commerce restonchamber.org/ on Thursday, February 20.

Blog

Preparing for CMMC (Cybersecurity Maturity Model Certification)

CMMC is a certification that will be required for every firm…
BEI employee and password security

Blog

Improve your security by following NIST password guidelines

Most people are guilty of using the same password for many accounts. This widespread password reuse makes your an easy target for cyberattacks. Based on NIST guidelines, we compiled the following suggestions to help you improve your password creation processes and educate your employees accordingly.
computer motherboard gavel compliance regulations

Managed IT Services

7 ways to stay current on compliance regulations

Federal government agencies issue thousands of rules every year. If your business is required to follow these regulations it can seem overwhelming keeping up with all the requirements. Here are tips on how to stay up-to-date and keep compliant.