An overview of when FCLs and PCLs need to be upgraded, and how the process works For both Personnel Clearances (PCLs) and Facility Clearances (FCLs), there are times where a clearance needs to be upgraded to respond to changing needs of a contract or mission. When you need a clearance upgrade, you don’t want to risk extending that process any longer than it needs to be. Understanding the … [Read more...] about The Process of Upgrading Your Facility or Personnel Clearance Level
When and why do you need a Temporary Sensitive Compartmented Information Facility? T-SCIFs, or Temporary Sensitive Compartmented Information Facilities, are a type of facility deployed when a regular SCIF can’t meet the needs of a mission or program. They are not a way around having to follow the strict requirements for a SCIF found in the ICD 705 Technical Specifications, or Tech Spec, but … [Read more...] about The Benefits of a T-SCIF
An overview of Foreign Ownership, Control or Influence and what it means for your cleared facility Because of the nature of national security, businesses seeking a clearance who have some level of Foreign Ownership, Control or Influence (FOCI) must report it to the government. In most circumstances, this will mean you are required to have some level of mitigation to ensure the data you’re … [Read more...] about What is FOCI in security?
How these two forms relate to your FCL, plus common mistakes in filling them out Both the DD 441 and SF 328 are important forms for obtaining your Facility Clearance (FCL). On their face, they’re short and straightforward documents that you should be able to fill out with relative ease. However, that doesn’t mean they can be written off as something that you don’t need to pay attention to. … [Read more...] about An Overview of The DD 441 and SF 328
Why the change is happening, what will be different, and how to get your NBIS login credentials The DCSA announced that the industry would be transitioning from the Defense Information System for Security (DISS) to the National Background Investigation Services (NBIS) system in early 2022, and at the time said this transition would begin on April 1 of that year. Currently, the NBIS rollout has … [Read more...] about What We Know so Far About the DISS to NBIS Transition
Tips on how to protect your PII to keep it out of scammers’ hands Identity theft remains the most common type of fraud in the U.S., and having your identity stolen can come with a hefty price tag or cost you your credit score. There were more than 1.1 million reports of identity theft made to the Federal Trade Commission in 2022. Typically, criminals will attempt to steal your information … [Read more...] about How to Protect Yourself From Identity Theft
Is AI something to fear, or a tool you can learn to use? Artificial Intelligence, or AI, is developing at a breakneck speed. While there are many innocuous uses, like using it to generate the most bizarre art prompts you can think of, it could pose a risk to your company security. At the same time, it could be harnessed to help strengthen your security. AI is evolving at such a rapid pace … [Read more...] about How Will AI Impact the Future of Security?
Why reading this long document matters and tips on how to be better informed on security policies The NISPOM (National Industrial Security Program Operating Manual), or 32 CFR Part 117, NISPOM, is the foundational cornerstone that enables Facility Security Officers (FSOs) to do their jobs well. It outlines a variety of protocols including how to maintain facility clearances (FCLs), what to do … [Read more...] about The Importance of Understanding the NISPOM
Know how to prevent insider threat by knowing what to look for Insider threats are a major danger to organizations. In the last two years, the cost of an insider threat incident has risen 44% to $15.38 million per incident on average, according to the 2022 Ponemon Cost of Insider Threats Global Reports. An insider threat can compromise your company’s security, leak proprietary information or … [Read more...] about How Does Someone Become an Insider Threat?