CompTIA Adopts Federal Framework For Cybersecurity

The major IT industry group CompTIA has tweaked its security certification program to match the National Institute of Standards and Technology (NIST) cybersecurity framework.


CompTIA has board members from Comcast, Dell, Hewlett-Packard and Xerox.Its CompTIA Security Trustmark+ program evaluates companies’ cybersecurity architecture.

We’ve strengthened the underpinnings of the Trustmark so that it aligns with other rigorous security compliance standards,said Nancy Hammervik, CompTIA senior vice president for industry relations.

Industry groups and government departments have been the main proponents of the federal framework. Surveys show small businesses have largely yet to discuss, let alone implement, the guidance for guarding against hackers.

One health IT industry group told NIST that awareness of the framework in the healthcare sector is “modest,” and that adoption is likely to be very small.

Last week, the National Cyber Security Alliance partnered with the International Franchise Association to bring basic cybersecurity measures based on the NIST framework to popular franchises such as 7-Eleven, Dairy Queen, Jiffy Lube, Papa John’s and KFC.

CompTIA has roughly 40 companies in the Trustmark+ program .Hammervik noted those companies undergo independent audits to earn accreditation .Customers can rest assured that their data is being handled by an organization that takes security seriously and professionally,she said.

CompTIA: IoT Will Drive Business For Existing, New Enterprises

The Internet of Things (IoT) is a big part of both companies and start ups existing IT, according to a new study by CompTIA.New company study says that while much of the industry remains cautious about the state of the idiot as the next big thing,a combination of hardware, software and services in the ecosystem of the IO is a sure way to generate significant business opportunities.


The results are partly on a recent CompTIA study,the things that is based 297 IT companies in the United States surveyed during the month of July.Current number of data you have the device with the Internet is more than 50 million in 2020 related, compared to the current total of 14.4 million units in the year 2014th

Many elements of IO are rooted in traditional IT components,which is good news for IT companies with experience in the construction and linking of complex systems,said Seth Robinson,senior director of technology analysis,CompTIA,in a statement.At the same time, it is likely to see the emergence of many new focusing companies on specific aspects of these systems,such as devices and data analysis.The real value will come from the combined IO and connectivity of all parts.

When asked what company is expected to make the most money, 45 percent of respondents said that technology companies stand to make the most sales, with 43 percent saying that the analysis data and big data companies would benefit most. The most divisive figures indicate that companies are still not sure who will benefit most from the IO in the coming years.

Respondents responded similarly to the question of which way the Internet of things most likely have an impact or added value,such as 46 percent,the Internet of things is likely to create new income opportunities online business systems,or 45 percent,probably continuing efforts to monitor and control the newly connected devices.

Respondents also provide the Internet of Things will provide new opportunities for collecting data flows,adding intelligence to the dumb objects or systems and in obtaining context information about clients.

The true value of the Internet of things is not only the data generated and collected, but in services that protect data, analyzing and presenting results in a useful way, Robinson said.


While research CompTIA is useful for us to take the overall temperature of the industry, one thing is certain the Internet of Things will change for all of us to sign on the IT sector. Whether it has the potential to rake in profits,however,is another matter.

CompTIA Exam Queston 33

Queston 33

In which of the following scenarios is PKI LEAST hardened?

A. The CRL is posted to a publicly accessible location.
B. The recorded time offsets are developed with symmetric keys.
C. A malicious CA certificate is loaded on all the clients.
D. All public keys are accessed by an unauthorized user.

Answer: C

Free IT Security Assessment Wizard Available From CompTIA


A free tool for information technology (IT) solution providers to increase their security pension customers is by CompTIA,the association of the IT industry.Assistant Security Evaluation of IT security community has developed IT CompTIA is a vendor independent tool free web-based providers of IT security can be used to create a wide profile of security for their customers.The final product is a must view,comprehensive and common strengths and weaknesses of each client’s unique security sense.

Educating customers is often the biggest obstacle is a solutions provider when it comes to security,Scott Barlow,vice president of Global Sales, Inc.President and reflection Networks community IT security CompTIA said.Many organizations still below the” can not happen “mentality serve me. Reality is a security breach can happen to any company and do it too often if you are not prepared.

11 years Trends Information Security CompTIA study found that only 13 percent of companies had made significant changes to its approach to security in the last two years.Yet during the same time period,many companies have made changes significant practices in the use of technology for example, covers cloud computing, so that BYOD employees and expand the use of social tools.

The IT Security Assessment Wizard enables a solution provider to engage their customers and prospects in a simple, yet comprehensive examination of their security infrastructure and practices.It identifies and assesses the tools they currently have in place and offers options for deploying other resources in areas where security may be lacking.The IT Security Assessment Wizard draws on the collective expertise of dozens of our industry’s top security practitioners,noted Nancy Hammervik, senior vice president, industry relations, CompTIA.

CompTIA Exam Queston 32

Queston 32

Privilege creep among long-term employees can be mitigated by which of the following procedures?

A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation

Answer: A