Mainstay Technologies
Speciality: Risk-Based Penetration Testing
IT services company specializing in cybersecurity assessments and penetration testing; based in Manchester, NH with headquarters at 25 Sundial Ave, Suite 504W; offers security testing using simulated hacking techniques and technical assessments by security professionals.
Cybersecurity Maturity Model Certification (CMMC)
Origin
The Cybersecurity Maturity Model Certification (CMMC) was created by the U.S. Department of Defense (DoD) in 2020 in response to increasing cybersecurity threats targeting the Defense Industrial Base (DIB). The framework was developed to ensure that defense contractors and subcontractors adequately protect Controlled Unclassified Information (CUI) and Federal Contract Information (FCI) in their systems. The DoD recognized that existing self-attestation methods were insufficient to safeguard sensitive defense-related data from sophisticated cyber attacks, particularly from nation-state adversaries, prompting the need for a more rigorous, third-party verification system.
Industry Value and Importance
CMMC certification has become essential for companies seeking to do business with the Department of Defense, as it is now a contractual requirement for defense contractors. The certification demonstrates that an organization has implemented appropriate cybersecurity practices and processes to protect sensitive government information, making it a competitive differentiator in the defense contracting marketplace. Beyond compliance, CMMC helps organizations improve their overall cybersecurity posture, reduce breach risks, and build trust with government clients and partners. The tiered certification structure allows companies to align their security investments with the sensitivity of the information they handle, making it both practical and scalable across the diverse defense supply chain.
SOC 2 Type 2 Certification
Origin
SOC 2 (System and Organization Controls 2) was developed by the American Institute of Certified Public Accountants (AICPA) and introduced in 2011 as part of their Service Organization Control reporting framework. It was created to address the growing need for standardized security auditing as businesses increasingly moved their data and operations to third-party cloud service providers. The AICPA recognized that traditional financial auditing standards were insufficient for evaluating the security practices of technology service providers, prompting the development of SOC 2 to assess controls related to security, availability, processing integrity, confidentiality, and privacy based on their Trust Services Criteria.
Industry Importance
SOC 2 Type 2 certification is highly valued because it provides independent verification that a service provider has implemented and maintained effective security controls over a specified period (typically 6-12 months), rather than just at a single point in time like Type 1. This certification has become an essential requirement for vendors handling sensitive customer data, as it demonstrates to clients and stakeholders that robust security measures are consistently in place. Many enterprises now require SOC 2 Type 2 reports from their vendors as part of their third-party risk management programs, making it a competitive necessity for SaaS companies, cloud providers, and data processors seeking to build trust and win business with security-conscious organizations.
- Nathan Wechsler & Company
- Belknap County
- Mid-State Health Center
- Granite State Glass