- JAMIS’ Customer, Cask Government Services; One of Only Four Authorized as a CMMC Third Party Assessor Organization (C3PAO) by the CMMC-AB
- JAMIS Customer Edwards Performance Solutions is the First Licensed Partner Publisher to Have Their Training Curriculum Accepted by the CMMC-AB
- JAMIS Harnesses Power of Cyber Security Experts to Form CMMC Readiness Group
JAMIS Provides Enterprise-Grade Data Protection for GovCon
JAMIS is committed to providing the most secure code on the market, and that is why we are happy to disclose how we take care of our code. In addition, JAMIS Prime is the first ERP in the GovCon space to deliver built-in multi-factor authentication, increasing your protections against cyber criminals.
JAMIS believes in ensuring our team is doing the right thing with the security of your data and delivering a world class solution. Part of this commitment means having an independent expert validate our Security and Compliance posture.
CISA Issues Shields Up Warning
In light of the heightened risk of cyber warfare following Russia's invasion of Ukraine this week, JAMIS is closely following the Cybersecurity & Infrastructure Security Agency (CISA) “Shields Up” guidance. CISA recommends that all organizations - regardless of size - adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.
While there are no specific or credible cyber threats to JAMIS customers or the United States at this time, Russia’s has been involved in cyber-attacks on Ukrainian government and critical infrastructure organizations, that may impact organizations both within and beyond the region, particularly in the wake of sanctions imposed by the United States and our Allies. CISA advises that every organization, large and small, must be prepared to respond to disruptive cyber activity.
CISA’s guidelines include actions that will: reduce the likelihood of a damaging cyber intrusion, take steps to quickly detect a potential intrusion, ensure that the organization is prepared to respond if an intrusion occurs, and maximize the organization's resilience to a destructive cyber incident. Read More >