• Netizen Named 2020 Game Changer

    Netizen Corporation, an ISO 27001:2013 and 9001:2015 certified provider of cybersecurity and related solutions for defense, government, and commercial markets, has been named a 2020 Game Changer by Lehigh Valley Businesses. Netizen received the Game Changer Business of the Year award within the 20-74 employee category. The Game Changers award recognizes and honors extraordinary business leaders and businesses that make a positive impact on the greater Lehigh Valley. The honorees consistently demonstrate strong leadership, integrity, values, vision, and a commitment to excellence.

    This year’s Game Changers awards celebration will be a virtual event held on December 9th starting at 5:30 p.m. (login opens at 5:00 p.m.) and can be viewed from any location with internet access. The program will be professionally produced including video storytelling, shoutouts from sponsors, and interaction from the audience through social media posts that appear live during the program. All winners will be celebrated during the event at LVB.com and through LVB’s social media channels.

    About Netizen

    America’s fastest-growing cybersecurity company, 2nd fastest-growing Veteran-owned company, and 47th fastest-growing private company overall in the nation according to the Inc. 5000 list of the nation’s most successful businesses, Netizen is a highly specialized cybersecurity solutions provider. They also develop innovative software products that include the award-winning AutoSTIG and Overwatch Governance Suite.

    The company, a certified Service Disabled Veteran Owned Business (SDVOSB), is headquartered in Allentown, PA, with additional locations in Virginia (DC Metro), South Carolina (Charleston), and Florida (Orlando). In addition to being one of the fastest-growing businesses in the US, Netizen has also been named as one of the nation’s “Best Workplaces” by Inc. Magazine, a “Game Changer” business of the year by Lehigh Valley Business, and is a US Department of Labor HIRE Vets Platinum Medallion awardee for veteran hiring and support for two years in a row. Learn more at Netizen.net.

  • The Difference Between CMMC and DFARS CUI

    From DFARS CUI to CMMC, we understand how challenging it can be to keep up with these regularly evolving compliance requirements. Here at Netizen, it is our goal to help guide our customers through the process with minimal cost or delay. Although DFARS CUI compliance and CMMC programs do overlap, the assessment (audit) process will be significantly different moving forward. To have a better understanding, let’s discuss the differences between the two. 

    The Main Differences

                DFARS regulations address how to keep data protected but specifically Controlled Unclassified Information (CUI) in order to help government contractors better protect sensitive data flowing in and out of their organization. Compliance to DFARS requires the appropriate security controls to be put in place to protect CUI, and the processes must be established to make reporting cybersecurity events simple. In contrast to DFARS, CMMC brings together a number of different security controls to create a hierarchy of maturity levels. These five maturity levels represent the different levels of data security government contractors provide.

    The differences in these two models is not only how they function, but how they are assessed. One major difference in DFARS and the CMMC model is the way compliance is assessed. DFARS helps to establish guidelines for self-assessment. This means government contractors are religiously monitoring their security controls and assessing them for effectiveness. If a breach is detected, it would have to be reported right away. Contractors in compliance with DFARS must continuously self-assess to keep data protected. On the other hand, CMMC requires assessments to be conducted by third party assessment organizations. Take Netizen for example, our certified personnel will help you determine whether or not you are appropriately aligned with a specific maturity level. 

    From DFARS to CMMC

    The Cybersecurity Maturity Model Certification (CMMC) has many of the same goals as DFARS. It is targeted to both government contractors and subcontractors. CMMC gathers a number of different security controls to create a hierarchy of maturity levels. The DoD released the Cybersecurity Maturity Model Certification to displace DFARS (NIST 800-171) ensuring it had satisfactory security to handle CUI. The CMMC Accreditation Body (AB) then made it clear that aligning with the DFARS standard is of prime importance to the Cybersecurity Maturity Model Certification from small business or prime DoD contractors. CMMC is now officially a requirement for any company providing goods or services in the defense market. Delay in implementing the standards could mean the loss of contracts and contract opportunities for your business.

    What Makes Our CMMC Solutions the Best?

    The answer is simple, we specialize in this field. At Netizen, we have been working diligently ensure that our clients are in line with upcoming CMMC requirements. As a company, we landed a spot on the 2020 Inc. 5000 list of America’s fastest growing businesses for the second year in a row. Netizen placed 184th overall in 2020 and 47th in 2019, which places us as the fastest growing company in the entire Lehigh Valley region. Not only is our company growing in size but so is our knowledge in the industry. Our personnel and company maintain advanced certifications and are continuously trained through our Netizen Academy program to stay ahead of the industry. To help DoD contractors prepare, we are offering a FREE initial assessment to determine gaps in your CMMC readiness. Contact us to ensure you have what you need to succeed. Our cybersecurity experts will start you on the path to full compliance, today.

  • The Issue With Cloud Databases

    A database left exposed and unsecured to the public is essentially begging for a cyberattack. Your vital data is now on the cloud, accessible to anyone, and wide open to attackers who will see it as a golden opportunity to siphon sensitive customer data from you. In a world where the average total cost of a data breach is $3.92 million and the average cost per lost or stolen record is $242, this isn’t something businesses should take lightly. 

    Look at the data

    Cybersecurity experts from Comparitech created a simulation of a database on a cloud server in which data is often stored on. They left it exposed and wanted to detect how long it would take for hackers to connect to it, steal from it, or destroy the data. They found 175 attacks beginning just 8 hours after deployment. The study accounted for an average of about 18 attacks per day. 

    Yes, it was just that easy for hackers to locate and retrieve important data from an exposed and improperly security cloud-based database. Data from Varonis shows that on average only 5% of a company’s folders and file storage systems, including those hosted on cloud-based services, are adequately protected. Don’t be a part of the 95% left exposed to the fast-paced world of cyberattacks and hacks.  

    The solution

    Minimize your risk and assume the worst when considering your exposed data. Consider what the likelihood and impacts of the loss of your data would be, and implement security controls in accordance with that level of risk. Security controls such as this may include access restrictions, cryptographically secured network connections, password policies, and other measures that, when combined, significantly lower the risk of a breach.

    Also, when leveraging cloud-based resources, security is often not implemented by default. Lock down access to your databases, systems, and files by creating virtual private networks, requiring proper authentication (such as an encryption key) for access, and implement traffic filtering security policies on your cloud networks to block traffic from non-approved locations and devices. Cloud service providers offer an array of tools to create, audit, and update permissions for specific cloud resources, though they are not always intuitive or easy to use, which leads to a lot of mistakes and major breaches.

    Statistics show that 24% of data breaches are caused by human error, such as a misconfiguration or other mistake. This can be avoidable by ensuring your data is stored safely and securely, regardless of where it rests. Netizen reduces the risk of a breach by providing an expertly-trained set of eyes on the situation at hand and by implementing risk-based, cost-effective monitoring software, including the award-winning Overwatch Governance Suite, and other security controls and solutions that don’t impede your daily operations or break the bank. Our CyberSecure Solutions take the pervasive fear of cyberattacks out of the equation, allowing business owners to sleep better knowing the state of their security and risk profile. Contact us today for a FREE consultation and discover the value we can provide your organization.

  • NETIZEN RANKS No. 184 ON THE INC. 5000 LIST OF AMERICA’S FASTEST GROWING COMPANIES WITH 2,222% GROWTH

    Allentown, PA: Netizen Corporation, an ISO 27001:2013 and ISO 9001:2015 certified Veteran Owned provider of cyber security and related solutions, was named for the second year in a row to the Inc. 5000 list of the nation’s most successful businesses. Founded in 2013 and led by CEO Michael Hawkins, Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government, defense, and commercial markets.

    Netizen ranked 184th overall on the 2020 Inc. 5000 list which places them as the fastest growing company in the Lehigh Valley region, the nation’s 2nd fastest growing cyber security company, the 2nd fastest growing company in all of Pennsylvania, and one of the fastest growing Veteran-Owned companies in America with three-year revenue growth of over 2,222%.

    In 2019, Netizen placed 47th overall, was the nation’s fastest growing cyber security company, and achieved the highest ranking that a company based in the Lehigh Valley region had ever achieved on the Inc. 5000 list, according to the official program website.

    The Inc. 5000 list represents a unique look at the most successful companies within the American economy’s most dynamic segment— its independent small and midsized businesses. Companies such as Microsoft, Dell, LinkedIn, Yelp, Zillow, and many other well-known names gained their first national exposure as honorees of the Inc. 5000.

    “Being ranked in the highest tiers of the Inc. 5000 list for a second year in a row is perhaps yet again the truest testament to the capabilities of our world-class team which boasts a cadre of industry-recognized leaders and professionals,” said Michael Hawkins, Netizen’s President and CEO. He added, “I attribute much of this success to our process-focused, employee-centric, and innovation-nurturing corporate culture which provides unmatched career growth opportunities for ambitious professionals and superior products and services for customers.”

    As an Inc. 500 awardee, which is reserved for the top tier of companies on the Inc. 5000 list, Netizen will be profiled featured in the September 2020 issue of Inc. Magazine.

    About Netizen Corporation:

    America’s fastest-growing cybersecurity company, 2nd fastest-growing Veteran-owned company, and 47th fastest-growing private company overall in the nation according to the 2019 Inc. 5000 list of the nation’s most successful businesses, Netizen is a highly specialized cybersecurity solutions provider. They also develop innovative software products that include the award-winning AutoSTIG and Overwatch Governance Suite.

    The company, a certified Service Disabled Veteran Owned Business (SDVOSB), is headquartered in Allentown, PA, with additional locations in Virginia (DC Metro), South Carolina (Charleston), and Florida (Orlando). In addition to being one of the fastest-growing businesses in the US, Netizen has also been named as one of the nation’s “Best Workplaces” by Inc. Magazine and is a US Department of Labor HIRE Vets Platinum Medallion awardee for veteran hiring and support for two years in a row. Learn more at Netizen.net.

    POINT OF CONTACT:

    Michael Hawkins
    Founder and CEO
    Phone: 1-800-450-1773
    Email:   press@Netizen.net

  • The Key to Compliance: Vulnerability Assessments

    Assessing vulnerabilities through comprehensive testing and analysis mitigates issues in your technology infrastructure before they can take a toll on business operations, providing you a safe and efficient workflow that is uninterrupted and minimizing risk. The US National Institute of Standards and Technology (NIST) defines a vulnerability as a weakness in an information system, a security procedure, an internal control, or even a weakness in an implementation that could be exploited by a threat source. How many does your company have? How are you identifying, tracking and mitigating those vulnerabilities?

    Information systems are bound to have weaknesses, but not all information systems have the same level of sensitivity to attack. That doesn’t mean they should go undetected or untested on a recurring basis. Routine vulnerability assessments evaluate what risks and threats exist for your business systems, assign severity levels to them, and ultimately recommend modifications or countermeasures to minimize the risk of a breach. 

    After a breach, it is already too late, and the cost of repair is typically 10 to 15 times higher than what even the highest levels of preventative measures would cost. The ramifications of a breach go well beyond system downtime, too. In multiple studies, a majority of customers surveyed routinely said they would likely be wary of continuing to do business with a company that suffered a breach, especially if their personal information was impacted in any way.

    It’s important to get ahead of cyberattacks before they can occur. Cybercrime is on the rise with hackers attacking a business just like yours every 39 seconds, on average 2,244 times per day. And it’s not just the large businesses that are the targets – actually, it’s typically the opposite. Small businesses, the majority of breach victims, are seen by attackers as easier targets they can then leverage to gain access to others, such as your customers, vendors, and suppliers. Protect your company before joining the multitude of those affected by attacks. 

    Types of testing

    Vulnerability assessments can be done on servers, computer workstations, networks and even connected devices, such as manufacturing equipment, HVAC sensors, and the like. There isn’t just one type of assessment. Take a look at the following:

    • Network-based assessment:  discovers possible security flaws and vulnerable systems on either wired or wireless networks.
    • Host-based assessment: scans servers, workstations, and other network hosts. Looks into a device’s configuration settings and patch history.
    • Application assessment: tests websites for software vulnerabilities and defective configurations.
    • Database assessment: helps prevent cyberattacks by finding weak spots in database security.
    • Wireless network assessment: looks for rogue access points in wi-fi networks and confirms secure configuration
    • Industrial controls assessment: discovers, tests, and audits the security status of industrial controls and other devices ranging from HVAC systems to complex connected manufacturing equipment. Even biomedical devices are not immune and need to be tested and assessed.

    Benefits of testing

    1. Gain better insight – Learning about your threats and vulnerabilities gives you a whole new perspective on your business operations. By discovering the weaknesses within your organization’s security, you will be able to get ahead of the cyberattacks, educate your team on the specifics and importance of security, and implement new tools and processes to make your work safer and more efficient. 
    • Reputation – Building trust with those involved with your company, whether internally or externally, is essential to a successful business. A big part of trust is ensuring that their, and your, important data is secure. A majority of customers surveyed indicated they would be wary of continuing to work with a business that suffered any sort of breach, with a large portion (over 30%) saying they would cut all ties to that business.
    • Efficiency – Recovering lost data and important information sets your company back. Imagine if that data was gone forever, as many companies found out when they realized their backups were old, inefficient, or non-functional when a breach took place. It takes exponentially more time, money, and resources to rebound from an attack than it does to prepare for one. If you take even basic preventative measures now, it will save much of the pain and agony our of a long recovery later on.
    • Meet Compliance – Compliance is often essential to business. Every company and its employees follow strict guidelines set by external forces due to regulations, laws, and industry standards. Compliance may also be an internal in the form of policies and ethical requirements set by the organization itself. Lose compliance and lose customers. Get ahead of evolving compliance programs now, not later.

    Netizen’s solutions bring vulnerability and compliance visibility to decision makers at an enterprise level, in terms they can understand. We are now offering a FREE trial of our award-winning Overwatch Governance Suite to help you stay ahead of ever-evolving technology risks and trends by monitoring your critical systems – right from your fingertips. Overwatch is not a one-and-done type assessment tools, it is the natural next step in continuous cybersecurity management and monitoring – offering simplified reporting and visibility, a large array of integrated tools, and simplified tracking for metrics, trends, milestones, compliance tasks and more. Contact us at to schedule your demo and sign up for a free trial today! 

    Your cost effective enterprise Cyber Governance Suite awaits at https://overwatchsuite.com/.

  • Prepare Your Company For CMMC

    What is CMMC?

    The Cybersecurity Maturity Model Certification (CMMC) was created by the Department of Defense (DoD) in order to put a cybersecurity assessment model and certification program in place. The CMMC is a unified standard for implementing cybersecurity across the defense industrial base. 

    Contractors used to be responsible for implementing and monitoring the security of their information systems. While they are still responsible, the CMMC changes these standards and requires third-party assessments of contractors’ compliance with certain mandatory practices, procedures and capabilities that can adapt to new and evolving cyber threats and adversaries. 

    Who does it apply to?

    The initial requirements of the CMMC were released in January of 2020. The first to adopt were a small selection of organizations. Eventually, all DoD contractors will be required to obtain a certification, including all suppliers at all tiers along the supply chain, commercial item contractors, small businesses, and foreign suppliers.

    It is noted that it may be as early as June of 2020 that the DoD begins to include minimum certification requirements in requests for information and September of 2020 for requests of proposals. It is important that certification preparation begins immediately. 

    Levels of compliance (1-5)

    The levels of compliance act as building blocks, ensuring with each level advancement, the prior levels are also in practice. 

    Level 1: Basic Cyber Hygiene – Performed

    Requires companies to use antivirus software or ensure employees change passwords regularly to protect any Federal Contract Information, or information generated for the Government under a contract.

    Level 2: Intermediate Cyber Hygiene – Documented 

    Requires that companies document processes including SOPs, policies, and strategic plans in order to protect any Controlled Unclassified Information (CUI). 

    Level 3: Good Cyber Hygiene – Managed 

    Requires a company to have an institutionalized management plan to safeguard CUI. This includes all the NIST 800- 171 r2 security requirements as well as additional standards.  

    Level 4: Proactive – Reviewed 

    Requires companies to implement processes for reviewing and measuring the effectiveness of practices as well as have addition practices detect and respond to advanced persistent threats. 

    Level 5: Advanced/Progressive – Optimized 

    Standardized and optimized processes are required to be in place. APTs are required to be detected and must be responded to at this level. These processes must be implemented company wide. 

    This is only the beginning of a shift in our industry’s culture revolving surrounding the topic of internal cybersecurity. All DoD contractors are advised to learn the CMMC’s requirements and plan for certifications. To help DoD contractors prepare, we are offering a FREE initial assessment to determine gaps in your CMMC readiness. Contact us to ensure you have what you need to succeed. Our cybersecurity experts will start you on the path to full compliance, today.

  • NETIZEN AWARDED $9.2M U.S. ARMY CYBERSECURITY CONTRACT

    ALLENTOWN, PA: Netizen Corporation, an ISO 27001 and ISO 9001 certified provider of cybersecurity solutions for defense, government, and commercial markets, was awarded a multiple-year Blanket Purchase Agreement (BPA) contract by the US Army on April 28th with a total value of up to $9.2M for a variety of cybersecurity solutions in support of the Project Manager Soldier Training (PM ST) in Orlando, Florida.

    PM ST’s mission is to provide a full echelon of sustainable live and virtual training solutions enabling Soldiers, Units and Leaders the ability to maintain Readiness at all times. This new single-award BPA contract includes a 12-month base period of performance and four 12-month option periods, totaling up to five years in duration. Netizen will be supporting critical programs across the PM ST portfolio by providing expert cybersecurity engineering, assessment, and NIST Risk Management Framework (RMF) solutions in Orlando and other locations stateside and overseas.

    “Netizen is renowned for our unique level of specialization, as our team members are amongst the most highly experienced cyber professionals anywhere, and our products and solutions are trusted by customers worldwide. We look forward to continuing our work with this key customer for years to come by providing PM ST with the best possible value and expertise,” said Michael Hawkins, Netizen’s Founder and CEO.

    He added that Netizen anticipates expanding the company’s presence in Orlando to support this and other efforts such as their fully paid education program, Netizen Academy. This program will identify, train, certify, mentor, and staff the next generation of cyber professionals to meet ever-increasing industry demand. Netizen Academy targets recent college graduates, transitioning service members, veterans, and others seeking to be up-skilled for a rapidly-growing career field while getting paid to do it.

    ABOUT NETIZEN CORPORATION
    America’s fastest-growing cybersecurity company, 2nd fastest-growing Veteran-owned company, and 47th fastest-growing private company overall in the nation according to the 2019 Inc. 5000 list of the nation’s most successful businesses, Netizen is a highly specialized cybersecurity solutions provider. They also develop innovative software products that include the award-winning AutoSTIG and Overwatch Governance Suite tools.

    The company, a certified Service Disabled Veteran Owned Business (SDVOSB), is headquartered in Allentown, PA, with additional locations in Virginia (DC Metro), South Carolina (Charleston), and Florida (Orlando). In addition to being one of the fastest-growing businesses in the US, Netizen has also been named as one of the nation’s “Best Workplaces” by Inc. Magazine and is a US Department of Labor HIRE Vets Platinum Medallion awardee for veteran hiring and support. Learn more at Netizen.net.

  • Is your company prepared for the great remote work experiment?

    Remote work is here to stay and, as the most recent COVID-19 pandemic declaration is beginning to demonstrate, it can be a highly effective disaster mitigation and recovery strategy when implemented properly. However, too many companies and other organizations have been caught unprepared technologically, and attackers have been waiting for just such an opportunity to pounce. My intent here is not to argue the merits or drawbacks of remote work in its various forms as a daily practice, but rather to highlight some of its inherent risks when implemented on such a vast scale so quickly under the impetus of external factors.

    The first of these risk factors is social. Various studies have shown that a majority, at least, of human communication is in the form of body language and other nonverbal forms. Lacking inflection, tone, and posturing, many electronic communication media that so easily facilitate remote work also make it harder to determine legitimate from illegitimate communications without an effectively trained workforce that is adept in identifying attempts at misleading them into taking actions harmful to the organization. Take for instance email. Now, we all get bombarded with attempts to steal passwords, data, and documents on a daily basis, also known as Phishing. Spear Phishing, however, is becoming much more prevalent and are essentially the more highly targeted forms of routine Phishing. Spear Phishing leverages publicly available information on a person to either manipulate or impersonate them. It can often be hard to detect, especially when relying predominantly on email for communication amongst your newly remote workforce.

    When you work in an office and you receive an email from someone two cubicles over telling you they need “all the company payroll data,” it is easy to verify the validity of that request with a short walk, a discussion about the rationale, talking to a supervisor to ascertain the person’s authorization to access the information, and responding accordingly. What such processes are in place for your remote workforce? It can be done, but typically involves a more asynchronous form of communication; you send a message, move on to other work whilst awaiting a response, and proceed from there. But what if the message was far more urgent? The recipient would then have to make a snap decision on the validity of the request, and this is a tactic that attackers leverage to coerce their intended target more effectively, especially if the “request” seemingly comes from a someone in a position of authority. That split-second decision, especially when perceived to come from an authoritative resource within the organization, can make-or-break your company. This is why mandatory training on common social engineering attacks (like Phishing) should be implemented routinely (i.e. annual at the very least), especially for anyone participating in remote work. Making so called “cyber hygiene” training a mandatory requirement for remote work participation is also a good idea. Doing so will inform your remote workforce of the processes used for validating and responding to requests while more easily identifying and reporting the malicious ones.

    Training is great, but it can’t do everything. The second risk factor is purely technological. The systems and tools you use to facilitate remote work are crucial to success, but also play an outsized role in the security and confidentiality of your data now, too. It is inevitable that some employees will attempt to leverage personal devices for work related tasks. What sort of controls does your organization have in place to manage corporate data, even if processed using a personal device? A solid mobile device management (MDM) suite along with data rights management (DRM) policies will help prevent leakage or loss of sensitive data on portable devices, even personally-owned employee ones. For instance, Office 365 has exceptional MDM and DRM policies and filtering that can be set up rapidly to prevent the transmission of sensitive data, like financial information and social security numbers. MDM can also provide functionality to remote-wipe a device if lost and enforce security protocols such as strong passwords and data encryption. Even better, Microsoft provides their comprehensive Security and Compliance Center to visualize threats, alerts, and other critical information pertaining to the overall security posture of your organization. This is just an example of one provider offering, there are many others – it’s more important that you leverage the tools you have effectively than to choose one particular vendor over another. Companies that specialize in these types of remote security management can provide cost effective expertise to mitigate your biggest cyber threats that a remote workforce creates and help prevent hundreds of thousands or even millions of dollars in breach remediation costs.

    The last portion we will discuss here is policy. Training, Policy, and Technology is sort of the “iron triangle” of basic cyber preparedness. Without one side, the rest will fall. Policy need not be bureaucratic to be effective, contrary to many practices. A solid set of policies and documentation will guide employees on what to do and what not to do while standardizing your response to incidents, implementation of security procedures, and provide a reporting structure so everyone is properly informed and knowledgeable, regardless of their workplace location. Essential policies that your organization should already have go beyond simple things like password requirements and deeper into areas such as electronic resource availability (e.g. file sharing), personal device usage (e.g. BYOD), connectivity requirements (e.g. VPN usage, email, etc.), physical workplace restrictions, and contingencies in the event of breach or loss of connectivity. Defining and describing these things ahead of time will go a long way in preparing your workforce for the security challenges of remote work. It will also provide a standard “playbook” so to speak from which everyone within your organization can operate from. Once policies are in place, it is a good idea to have employees review and sign them along with a comprehensive remote work agreement that outlines their responsibilities, duty hours, requirements, and other attributes. Many companies have standardized templates and can help you get started quickly with such policies, but they are of little use if not enforced. Enforcement of policies requires discipline, as it would be easy to make exceptions for every little bump in the road, but that is not safe. While your chosen policies should not hinder the work of remote employees, it still has to ensure the safety and security of your data that is now being transmitted off-site. There is a balance, and each organization has to fine theirs based on risk profile and what level of risk is considered acceptable to your operations.

    I’ve gone over some of the basics of remote work security, focusing on the core attributes of training, policy, and technology. This is a framework from which to get started with securing your corporate data as it moves out of the office and across the country. Keep in mind there are other aspects, legal and supervisory for example, that aren’t covered but also important. Many companies will also have far more complex requirements, and should not hesitate to retain experts in implementation for the simple reason that an ounce of prevention is worth a pound of cure. The “cure” in this instance, being the remediation of often disastrous and costly effects of a breach that include loss of customer confidence, legal fees, higher insurance premiums, and lost business. As the size of the world’s remote workforce increases year after year, every organization should be prepared to take advantage, even if only for use in mitigating the impact to business operations of external factors. Leaders must be aware of the ever-shifting landscape of tools, technologies, and threats to such operations, however, in order to stay ahead of the curve, and the best way to do that is to rely on experts.

  • NETIZEN NAMED THE SECOND-FASTEST-GROWING VETERAN OWNED BUSINESS IN THE NATION

    Allentown, PA: Netizen Corporation, an ISO 27001:2013 and ISO 9001:2015 certified provider of cybersecurity and related solutions for defense, government, and commercial markets, has been named the nation’s second-fastest-growing veteran-owned business by Inc. Magazine and the Institute for Veterans and Military Families (IVMF) at Syracuse University on their annual Vet100 list of the most successful veteran-owned companies in the United States.

    Netizen has also been ranked as the 47th fastest-growing private company and the fastest-growing cybersecurity company in the United States on the Inc. 5000 list of the nation’s most successful businesses. These are the highest rankings that a company based in the Lehigh Valley region of Pennsylvania have ever achieved on the Vet100 and Inc. 5000 lists, according to published records on the official program website.

    Syracuse University’s IVMF is higher education’s first interdisciplinary academic institute, focused on advancing the lives of the nation’s military veterans and their families. As a result of this special recognition, Netizen leadership will be attending, as an invited guest of the IVMF, the national veteran-owned business growth conference, Veteran EDGE, beginning March 7th, 2020 in Dallas, TX.

    “We are very proud to receive such recognition within the close-knit veteran-owned business community. It speaks volumes to the incredible team we’ve assembled here at Netizen, with every military branch represented across a diverse group of team members located around the country and serving customers globally,” said Michael Hawkins, Netizen’s founder and CEO as well as a U.S. Army veteran himself.

    About Netizen Corporation:
    Netizen, America’s fastest-growing cybersecurity company and 47th fastest-growing private company in the country according to the Inc. 5000 list of the nation’s most successful businesses, is a highly specialized cybersecurity and compliance solutions provider that works with IT departments, information system owners/developers, defense contractors, and federal government agencies to ensure appropriate levels of security and compliance controls are implemented and maintained for all types of systems. They also develop innovative cybersecurity software products that include the award-winning Overwatch Governance Suite.

    The company, a certified Service Disabled Veteran Owned Business (SDVOSB), was founded in late 2013 and is headquartered in Allentown, PA with satellite offices in Arlington, VA, and Charleston, SC as well as field locations in areas including Orlando, FL, and Huntsville, AL. They have been named one of the nation’s Best Workplaces by Inc. Magazine and are a recipient of other notable awards including the U.S. Department of Labor HIRE Vets Platinum Medallion, Lehigh Valley Veteran-Owned Business of the Year, and Charleston Defense Summit Innovation Spotlight. Their commercial-focused subsidiary, CyberSecure Solutions, is also trusted to engineer, audit, and maintain cybersecurity solutions for businesses of nearly every size and type worldwide. Learn more at Netizen.net.

    POINT OF CONTACT:

    Rocco Zegalia
    VP of Sales and Marketing
    1-800-450-1773 ext. 717
    rzegalia@netizencorp.com

     

    #####

  • NETIZEN RECEIVES AWARD FROM U.S. DEPARTMENT OF LABOR FOR VETERAN EMPLOYMENT INITIATIVES

    Allentown, PA: Netizen Corporation, an ISO 27001:2013 and ISO 9001:2015 certified provider of cybersecurity and related solutions for defense, government, anDept. of Labor HIRE Vets Platinum Medallion Award Seald commercial markets, has received the HIRE Vets Platinum Medallion award from the U.S. Department of Labor for the hiring, retention and training of military veterans all over the country. Over 50% of Netizen’s employees nationwide are veterans and Netizen provides training, college scholarships, and paid internships to help veterans obtain careers in high-demand technical fields. This is the second year in a row that Netizen has been a recipient of this prestigious award.

    The HIRE Vets Medallion program was established under the Honoring Investments in Recruiting and Employing American Military Veterans, or HIRE Vets, Act signed into law on May 5, 2017 to recognize employers who hire, retain and support military veterans. The Platinum Medallion is the highest level of award a company can receive for this program and the citation states that “[Netizen] has demonstrated a model of patriotism worthy of praise as well as a recognition of the value veterans bring to the workplace.”

    “Our goal has always been to be known as a company that recognizes the special talents that military veterans in particular bring to the workforce, and this award is clearly demonstrative of that for the second year in a row,” said Michael Hawkins, Netizen’s founder and CEO as well as a U.S. Army veteran himself.

    About Netizen Corporation:
    Netizen, America’s fastest-growing cybersecurity company and 47th fastest-growing private company in the country according to the Inc. 5000 list of the nation’s most successful businesses, is a highly specialized cybersecurity and compliance solutions provider that works with IT departments, information system owners/developers, defense contractors, and federal government agencies to ensure appropriate levels of security and compliance controls are implemented and maintained for all types of systems. They also develop innovative cybersecurity software products that include the award-winning Overwatch Governance Suite.

    The company, a certified Service Disabled Veteran Owned Business (SDVOSB), was founded in late 2013 and is headquartered in Allentown, PA with satellite offices in Arlington, VA, and Charleston, SC as well as field locations in areas including Orlando, FL, and Huntsville, AL. They have been named one of the nation’s Best Workplaces by Inc. Magazine and are a recipient of other notable awards including the U.S. Department of Labor HIRE Vets Platinum Medallion, Lehigh Valley Veteran-Owned Business of the Year, and Charleston Defense Summit Innovation Spotlight. Their commercial-focused subsidiary, CyberSecure Solutions, is also trusted to engineer, audit, and maintain cybersecurity solutions for businesses of nearly every size and type worldwide. Learn more at Netizen.net.

    POINT OF CONTACT:

    Rocco Zegalia
    VP of Sales and Marketing
    1-800-450-1773 ext. 717
    rzegalia@netizencorp.com

     #####