• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Cybersecurity

Home Cybersecurity (Page 10)

Cybersecurity is the practice of protecting computer systems, networks, and data from digital attacks, unauthorized access, or damage. It involves using technology, processes, and strategies to safeguard information and ensure systems remain secure and reliable.

SEC Proposed Rule Could Add Cybersecurity to the Boardroom

SEC Proposed Rule Could Add Cybersecurity to the Boardroom

Mar 21, 2022

On March 9th, 2022, the Security and Exchanges Commission (SEC) issued several proposed amendments that could have a big impact on businesses.

Splunk & PenTest Magazine

Jul 16, 2020

Interested in how Splunk can help your cybersecurity posture at your organization? Download a copy of the PenTest Magazine 6/2020...

OCD Tech Takes 1st in Capture the Flag Event

OCD Tech Takes 1st in Capture the Flag Event

Oct 30, 2019

Saturday, October 26th was not a typical weekend afternoon for the team at OCD Tech. Instead of mowing our lawns...

Two U.S. Colleges scammed for over $870,000 in Spear-Phishing Attack

Two U.S. Colleges scammed for over $870,000 in Spear-Phishing Attack

Aug 15, 2019

Last week the United States Department of Justice (DOJ) issued a press release announcing the arrest of a cyber-criminal that...

Major Changes for DFARS Cyber

Major Changes for DFARS Cyber

Jul 11, 2019

his has been an action-packed year in the world of the Defense Federal Acquisition Regulation Supplement (DFARS) cybersecurity requirements.

Are You Ready to Be Audited by the DoD?

Are You Ready to Be Audited by the DoD?

Dec 12, 2018

If you are a prime or subprime contractor to the Department of Defense, chances are pretty good that you’ve heard of the DFARS clauses 252.204-7008…

Scraping Social Security Numbers on the Web

Scraping Social Security Numbers on the Web

Oct 1, 2018

One of the most accredited forms of validation for a citizen’s identity is a Social Security Number.

Enhanced Cybersecurity Requirements for Federal Contractors

Enhanced Cybersecurity Requirements for Federal Contractors

Feb 5, 2018

The Defense Federal Acquisition Regulation Supplement (DFARS) has been a central focus for contractors working with Covered Defense Information (CDI)...

Key Reinstallation AttaCK: aka KRACK

Key Reinstallation AttaCK: aka KRACK

Nov 1, 2017

A Technical Overview Recently, the news has been full of highly publicized but often misunderstood, vulnerabilities affecting a range of...

Decrease Successful Hacks by Improving Your Weakest Links

Jul 13, 2017

Companies spend millions on technology security annually to keep their virtual doors and windows locked.  This investment is a huge...

  • 1
  • 2
  • …
  • 9
  • 10
  • 11
  • 12
  • 13

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us