Skip to content

What Cybersecurity Compliance Requirements Apply to Aerospace Suppliers?

  

  

  What Cybersecurity Compliance Requirements Apply to Aerospace Suppliers? | RRG Networks

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  

  {

    “@context”: “https://schema.org”,

    “@type”: “Organization”,

    “@id”: “https://rrgnetworks.com/#organization”,

    “name”: “RRG Networks Solutions”,

    “url”: “https://rrgnetworks.com”,

    “telephone”: “+1-305-834-7781”,

    “email”: “info@rrgnetworks.com”,

    “address”: {

      “@type”: “PostalAddress”,

      “streetAddress”: “12343 SW 132nd Ct”,

      “addressLocality”: “Miami”,

      “addressRegion”: “FL”,

      “postalCode”: “33186”,

      “addressCountry”: “US”

    }

  }

  

  

  {

    “@context”: “https://schema.org”,

    “@type”: “FAQPage”,

    “mainEntity”: [

      { “@type”: “Question”, “name”: “What cybersecurity frameworks do aerospace suppliers need to comply with?”, “acceptedAnswer”: { “@type”: “Answer”, “text”: “Aerospace suppliers working with government contractors must comply with NIST SP 800-171 and ITAR. These frameworks require 100+ security controls including access control, MFA, continuous monitoring, encryption, and incident response planning.” } },

      { “@type”: “Question”, “name”: “How many security controls does NIST 800-171 require?”, “acceptedAnswer”: { “@type”: “Answer”, “text”: “NIST SP 800-171 defines 110 security controls required to protect Controlled Unclassified Information (CUI). These controls span 14 security domains including access control, incident response, configuration management, and system protection.” } },

      { “@type”: “Question”, “name”: “What happens if an aerospace supplier fails to meet cybersecurity compliance requirements?”, “acceptedAnswer”: { “@type”: “Answer”, “text”: “Organizations that fail to meet NIST 800-171 or ITAR requirements risk losing government contracts, being removed from the defense supply chain, and facing potential legal liability for failing to protect CUI or ITAR-regulated technical data.” } },

      { “@type”: “Question”, “name”: “Can RRG Networks help aerospace suppliers achieve NIST 800-171 compliance?”, “acceptedAnswer”: { “@type”: “Answer”, “text”: “Yes. RRG Networks provides compliance-focused cybersecurity services for aerospace suppliers across South Florida including security gap assessments, infrastructure hardening, policy development, and continuous monitoring aligned to NIST 800-171 and ITAR requirements.” } }

    ]

  }

  

  

  {

    “@context”: “https://schema.org”,

    “@type”: “BreadcrumbList”,

    “itemListElement”: [

      { “@type”: “ListItem”, “position”: 1, “name”: “Home”, “item”: “https://rrgnetworks.com” },

      { “@type”: “ListItem”, “position”: 2, “name”: “Resources”, “item”: “https://rrgnetworks.com/resources/” },

      { “@type”: “ListItem”, “position”: 3, “name”: “Aerospace Cybersecurity Compliance”, “item”: “https://rrgnetworks.com/resources/aerospace-cybersecurity-compliance-requirements” }

    ]

  }

  

  

    *, *::before, *::after { box-sizing: border-box; margin: 0; padding: 0; }

    :root {

      —orange: #F26522;

      —orange-hover: #d9571b;

      —orange-light: #FFF3EC;

      —orange-icon-bg: #FEF0E6;

      —black: #222222;

      —white: #ffffff;

      —gray-bg: #F5F5F5;

      —gray-border: #E0E0E0;

      —text-heading: #222222;

      —text-body: #555555;

      —text-light: #888888;

      —font: ‘Roboto’, Arial, Helvetica, sans-serif;

    }

    html { scroll-behavior: smooth; }

    body { font-family: var(—font); color: var(—text-body); line-height: 1.7; background: var(—white); }

    h1,h2,h3,h4,h5,h6 { font-family: var(—font); color: var(—text-heading); line-height: 1.3; }

    a { text-decoration: none; color: var(—orange); transition: color .3s; }

    a:hover { color: var(—orange-hover); }

    .container { max-width: 1140px; margin: 0 auto; padding: 0 20px; }

    /* === HERO === */

    .hero { padding: 60px 0 50px; background: var(—white); border-bottom: 3px solid var(—orange); }

    .hero .container { max-width: 900px; text-align: center; }

    .hero h1 { font-size: 2.4rem; font-weight: 900; margin-bottom: 10px; line-height: 1.2; }

    .hero h2 { font-size: 1.25rem; font-weight: 400; color: var(—text-body); margin-bottom: 25px; line-height: 1.6; }

    .hero .phone-big { font-size: 1.6rem; font-weight: 900; color: var(—text-heading); margin-bottom: 25px; }

    .hero .phone-big a { color: var(—text-heading); }

    .hero .phone-big a:hover { color: var(—orange); }

    .btn-orange { display: inline-block; background: var(—orange); color: var(—white); padding: 14px 36px; border-radius: 4px; font-size: 1rem; font-weight: 700; transition: background .3s; border: none; cursor: pointer; }

    .btn-orange:hover { background: var(—orange-hover); color: var(—white); }

    .btn-outline { display: inline-block; background: var(—white); color: var(—orange); padding: 14px 36px; border-radius: 4px; font-size: 1rem; font-weight: 700; border: 2px solid var(—orange); transition: all .3s; cursor: pointer; }

    .btn-outline:hover { background: var(—orange); color: var(—white); }

    .hero-btns { display: flex; gap: 15px; justify-content: center; flex-wrap: wrap; }

    /* === SECTIONS === */

    .section-intro { text-align: center; max-width: 800px; margin: 0 auto 40px; }

    .section-intro h2 { font-size: 1.9rem; font-weight: 900; margin-bottom: 12px; }

    .section-intro p { color: var(—text-body); font-size: 1rem; }

    /* === REASONS / FRAMEWORKS === */

    .reasons { padding: 60px 0; background: var(—gray-bg); }

    .reasons-grid { display: grid; grid-template-columns: repeat(2, 1fr); gap: 30px; }

    .reason-card { display: flex; gap: 18px; align-items: flex-start; }

    .reason-number { min-width: 50px; height: 50px; background: var(—orange); color: var(—white); border-radius: 50%; display: flex; align-items: center; justify-content: center; font-size: 1.4rem; font-weight: 900; }

    .reason-card h3 { font-size: 1rem; font-weight: 700; margin-bottom: 5px; }

    .reason-card p { font-size: 0.9rem; color: var(—text-body); line-height: 1.6; }

    /* === THREATS / GAPS === */

    .threats { padding: 60px 0; background: var(—white); }

    .threat-grid { display: grid; grid-template-columns: repeat(3, 1fr); gap: 25px; }

    .threat-card { background: var(—white); border: 1px solid var(—gray-border); border-radius: 6px; padding: 28px 22px; text-align: center; transition: box-shadow .3s, border-color .3s; }

    .threat-card:hover { box-shadow: 0 6px 20px rgba(0,0,0,0.08); border-color: var(—orange); }

    .threat-icon { width: 56px; height: 56px; background: var(—orange-icon-bg); border-radius: 12px; display: flex; align-items: center; justify-content: center; margin: 0 auto 16px; }

    .threat-icon svg { width: 28px; height: 28px; }

    .threat-card h3 { font-size: 1rem; font-weight: 700; margin-bottom: 8px; }

    .threat-card p { font-size: 0.88rem; color: var(—text-body); line-height: 1.6; }

    /* === STATS BAR === */

    .stats-bar { background: var(—orange); padding: 40px 0; }

    .stats-grid { display: grid; grid-template-columns: repeat(4, 1fr); gap: 20px; text-align: center; }

    .stat-item h3 { font-size: 2.2rem; font-weight: 900; color: var(—white); }

    .stat-item p { font-size: 0.82rem; color: rgba(255,255,255,0.9); margin-top: 4px; }

    /* === SERVICES / STEPS === */

    .services { padding: 60px 0; background: var(—gray-bg); }

    .services-grid { display: grid; grid-template-columns: repeat(2, 1fr); gap: 30px; }

    .service-card { background: var(—white); border: 1px solid var(—gray-border); border-radius: 6px; padding: 30px 25px; text-align: center; transition: box-shadow .3s; }

    .service-card:hover { box-shadow: 0 6px 20px rgba(0,0,0,0.08); }

    .service-icon { width: 60px; height: 60px; background: var(—orange-icon-bg); border-radius: 14px; display: flex; align-items: center; justify-content: center; margin: 0 auto 16px; }

    .service-icon svg { width: 30px; height: 30px; }

    .service-card h3 { font-size: 1.1rem; font-weight: 700; margin-bottom: 8px; }

    .service-card p { font-size: 0.9rem; color: var(—text-body); line-height: 1.6; margin-bottom: 12px; text-align: left; }

    .check-list { list-style: none; text-align: left; }

    .check-list li { font-size: 0.88rem; color: var(—text-body); padding: 3px 0; padding-left: 22px; position: relative; }

    .check-list li::before { content: ’✓’; color: var(—orange); font-weight: 900; position: absolute; left: 0; }

    /* === CHECKLIST === */

    .checklist-section { padding: 60px 0; background: var(—white); }

    .checklist-grid { display: grid; grid-template-columns: repeat(2, 1fr); gap: 15px 40px; max-width: 900px; margin: 0 auto; }

    .checklist-item { display: flex; align-items: center; gap: 14px; }

    .check-icon { min-width: 32px; height: 32px; background: var(—orange-light); border-radius: 4px; display: flex; align-items: center; justify-content: center; color: var(—orange); font-weight: 900; font-size: 1.1rem; }

    .checklist-item span { font-size: 0.95rem; font-weight: 500; color: var(—text-heading); }

    /* === AUTHORITY === */

    .authority-section { padding: 50px 0; background: var(—gray-bg); }

    .authority-section .container { text-align: center; }

    .authority-links { display: flex; gap: 30px; justify-content: center; flex-wrap: wrap; margin-top: 20px; }

    .authority-links a { font-size: 0.88rem; font-weight: 600; color: var(—orange); border: 1px solid var(—gray-border); border-radius: 4px; padding: 8px 18px; background: var(—white); transition: all .3s; }

    .authority-links a:hover { background: var(—orange); color: var(—white); border-color: var(—orange); }

    /* === FAQ === */

    .faq-section { padding: 60px 0; background: var(—gray-bg); }

    .faq-list { max-width: 800px; margin: 0 auto; }

    .faq-item { border-bottom: 1px solid var(—gray-border); }

    .faq-question { width: 100%; background: transparent !important; background-color: transparent !important; border: none !important; padding: 18px 0; display: flex; justify-content: space-between; align-items: center; cursor: pointer; text-align: left; outline: none !important; box-shadow: none !important; }

    .faq-question:hover,

    .faq-question:focus,

    .faq-question:active { background: transparent !important; background-color: transparent !important; box-shadow: none !important; outline: none !important; }

    .faq-question h3 { font-size: 1rem; font-weight: 700; color: var(—text-heading); padding-right: 15px; transition: color .3s; background: transparent !important; }

    .faq-question:hover h3 { color: var(—orange); background: transparent !important; }

    .faq-toggle { font-size: 1.5rem; color: var(—orange); font-weight: 300; min-width: 24px; text-align: center; transition: transform .3s; }

    .faq-answer { max-height: 0; overflow: hidden; transition: max-height .4s ease; }

    .faq-answer.open { max-height: 300px; padding-bottom: 18px; }

    .faq-answer p { font-size: 0.9rem; color: var(—text-body); line-height: 1.7; }

    .faq-item.active .faq-toggle { transform: rotate(45deg); }

    /* === CTA === */

    .cta-section { padding: 60px 0; background: var(—white); text-align: center; border-top: 3px solid var(—orange); }

    .cta-section h2 { font-size: 1.9rem; font-weight: 900; margin-bottom: 12px; }

    .cta-section p { font-size: 1rem; color: var(—text-body); max-width: 700px; margin: 0 auto 25px; line-height: 1.7; }

    .cta-phone { font-size: 1.8rem; font-weight: 900; color: var(—text-heading); margin-bottom: 25px; }

    .cta-phone a { color: var(—text-heading); }

    .cta-phone a:hover { color: var(—orange); }

    .cta-btns { display: flex; gap: 15px; justify-content: center; flex-wrap: wrap; margin-bottom: 25px; }

    .cta-trust { display: flex; gap: 25px; justify-content: center; flex-wrap: wrap; }

    .cta-trust-item { font-size: 0.85rem; color: var(—text-light); display: flex; align-items: center; gap: 6px; }

    .cta-trust-item .dot { width: 8px; height: 8px; background: var(—orange); border-radius: 50%; }

    /* === INTERNAL LINKS === */

    .internal-links { padding: 40px 0; background: var(—white); border-top: 1px solid var(—gray-border); }

    .internal-links .container { text-align: center; }

    .internal-links h3 { font-size: 1.1rem; font-weight: 700; margin-bottom: 15px; color: var(—text-heading); }

    .internal-link-grid { display: flex; gap: 15px; justify-content: center; flex-wrap: wrap; }

    .internal-link-grid a { font-size: 0.85rem; font-weight: 500; color: var(—orange); padding: 8px 16px; border: 1px solid var(—gray-border); border-radius: 4px; transition: all .3s; }

    .internal-link-grid a:hover { background: var(—orange); color: var(—white); border-color: var(—orange); }

    /* === LAST UPDATED === */

    .last-updated { text-align: center; padding: 15px 0; font-size: 0.78rem; color: var(—text-light); background: var(—gray-bg); }

    /* === RESPONSIVE === */

    @media (max-width: 1024px) {

      .reasons-grid { grid-template-columns: 1fr; }

      .services-grid { grid-template-columns: 1fr; }

      .stats-grid { grid-template-columns: repeat(2, 1fr); }

    }

    @media (max-width: 768px) {

      .hero h1 { font-size: 1.8rem; }

      .hero h2 { font-size: 1.05rem; }

      .threat-grid { grid-template-columns: 1fr; }

      .checklist-grid { grid-template-columns: 1fr; }

      .stats-grid { grid-template-columns: 1fr 1fr; }

    }

    @media (max-width: 480px) {

      .hero { padding: 40px 0 35px; }

      .hero h1 { font-size: 1.5rem; }

      .hero-btns { flex-direction: column; }

      .btn-orange, .btn-outline { width: 100%; text-align: center; }

      .cta-btns { flex-direction: column; align-items: center; }

      .cta-btns .btn-orange, .cta-btns .btn-outline { width: 100%; text-align: center; }

      .stats-grid { grid-template-columns: 1fr; }

      .authority-links { flex-direction: column; align-items: center; }

    }

  

  

  

  

  

    

      

        

The 2 Key Cybersecurity Frameworks Affecting Aerospace Suppliers

        

If your company handles government contracts or defense-related technical data, these frameworks apply to you. Failure to comply risks contract loss, audit failure, and removal from the defense supply chain. RRG Networks helps aerospace companies across South Florida navigate every one of these requirements.

      

      

        

          

1

          

            

NIST SP 800-171 — 110 Required Security Controls.

            

NIST 800-171 defines the foundational framework for protecting Controlled Unclassified Information (CUI). Aerospace suppliers handling government data must implement all 110 controls across 14 security domains — including access control, audit logging, configuration management, and system protection.

          

        

        

          

2

          

            

ITAR — International Traffic in Arms Regulations.

            

ITAR controls how defense-related technical data is stored, shared, and transmitted. Aerospace companies handling ITAR-regulated information must ensure data is strictly protected and never accessible to unauthorized individuals or foreign nationals — including via cloud systems or remote access tools.

          

        

      

    

  

  

  

    

      

        

Common Compliance Gaps Found in Small Aerospace Companies

        

During security assessments, the same critical weaknesses appear repeatedly at small and mid-sized aerospace suppliers. These gaps don’t just create audit risk — they represent real vulnerabilities that could cost your company its government contracts and expose sensitive defense data.

      

      

        

          

            

          

          

No Documented Security Policies

          

NIST 800-171 requires written, implemented security policies. Companies without formal documentation fail compliance audits regardless of what technology they have in place.

        

        

          

            

          

          

No Centralized Security Monitoring

          

Without centralized logging and monitoring across all systems, organizations cannot detect breaches or demonstrate the audit trails required for NIST 800-171 compliance.

        

        

          

            

          

          

Weak Endpoint Protection

          

Standard antivirus doesn’t satisfy the endpoint detection and response requirements of NIST 800-171. Every device that touches CUI must have advanced protection, logging, and centralized management.

        

        

          

            

          

          

Limited Employee Security Training

          

NIST 800-171 requires role-based security awareness training. Employees who handle CUI must be trained to recognize phishing, handle data properly, and follow documented security procedures.

        

        

          

            

          

          

No Formal Incident Response Plan

          

NIST 800-171 requires a documented incident response capability. Without a formal plan, most suppliers lack the procedures needed to detect, contain, and recover from a cybersecurity incident — creating serious contractual and legal exposure.

        

        

          

            

          

          

Unencrypted CUI Data & Backups

          

NIST 800-171 requires encryption of CUI both at rest and in transit. Many suppliers store sensitive defense data on unencrypted drives or transmit it over unsecured channels — a direct compliance violation.

        

      

    

  

  

  

    

      

        

          

110

          

Security controls required under NIST SP 800-171

        

        

          

14

          

Security domains covered by NIST 800-171 requirements

        

        

          

60%+

          

Of cyberattacks target small and mid-sized businesses like local aerospace suppliers

        

        

          

$4.5M

          

Average cost of a data breach in manufacturing and industrial sectors

        

      

    

  

  

  

    

      

        

The 5 Core Security Controls Aerospace Suppliers Must Implement

        

Meeting NIST 800-171 and ITAR requirements isn’t a one-time project — it’s an ongoing program. RRG Networks implements and manages each of these controls for aerospace suppliers across South Florida, backed by our 24/7 Security Operations Center.

      

      

        

          

            

          

          

Step 1: Security Gap Assessment

          

Every compliance journey starts with an honest evaluation. We assess your existing systems, networks, policies, and processes against the specific requirements of NIST 800-171 and ITAR — producing a prioritized gap report that shows exactly what needs to be addressed.

          

                

  • Full network and endpoint inventory
  •             

  • CUI data flow mapping
  •             

  • Policy and documentation review
  •             

  • NIST 800-171 control gap analysis
  •             

  • Prioritized remediation roadmap
  •           

        

        

          

            

          

          

Step 2: Infrastructure Hardening

          

We implement the required security technologies across your environment — from endpoint protection and MFA to network segmentation and encryption. Every control is deployed to meet the specific technical requirements of the frameworks that apply to your organization.

          

                

  • Endpoint detection and response (EDR)
  •             

  • Multi-factor authentication (MFA) deployment
  •             

  • Network segmentation for CUI environments
  •             

  • Data encryption at rest and in transit
  •             

  • Privileged access management
  •           

        

        

          

            

          

          

Step 3: Policy & Documentation Development

          

Technology alone doesn’t satisfy NIST 800-171 — auditors require written, implemented policies covering every security domain. We develop the full documentation package your organization needs, tailored to your specific operations and workflows.

          

                

  • System Security Plan (SSP)
  •             

  • Incident response plan and procedures
  •             

  • Access control and acceptable use policies
  •             

  • Configuration management documentation
  •             

  • Employee security training records
  •           

        

        

          

            

          

          

Step 4: Continuous Monitoring

          

Compliance isn’t a one-time checkbox — it requires ongoing monitoring to detect threats, log activity, and maintain the audit trails that NIST 800-171 demands. Our 24/7 SOC monitors your environment continuously and generates the compliance evidence you need.

          

                

  • 24/7 Security Operations Center (SOC)
  •             

  • SIEM log collection and retention
  •             

  • Vulnerability scanning and patch management
  •             

  • User activity monitoring and alerting
  •             

  • Monthly compliance reporting
  •           

        

        

          

            

          

          

Step 5: Compliance Readiness Review

          

Before any formal audit or customer review, we conduct an internal readiness assessment to verify all controls are in place, documented, and operating as required. We resolve any open findings and ensure your security posture reflects the full NIST 800-171 and ITAR requirements applicable to your operation.

          

                

  • Internal readiness review against NIST 800-171
  •             

  • ITAR data handling verification
  •             

  • Open finding remediation
  •             

  • Evidence package organization
  •             

  • Plan of Action & Milestones (POA&M) management
  •           

        

        

          

            

          

          

Ongoing: Security Awareness Training

          

NIST 800-171 requires role-based security training for employees who handle CUI. We deliver ongoing training programs that satisfy NIST requirements — keeping your team aware of phishing, social engineering, and proper data handling procedures.

          

                

  • NIST-aligned security awareness curriculum
  •             

  • Phishing simulation campaigns
  •             

  • Role-based training for CUI handlers
  •             

  • Training completion tracking and records
  •             

  • Annual policy acknowledgment documentation
  •           

        

      

    

  

  

  

    

      

        

With Compliance-Focused IT Services from RRG Networks, Your Aerospace Company Gets:

      

      

        

NIST 800-171 Gap Assessment

        

ITAR Data Protection Controls

        

24/7 Security Operations Center (SOC)

        

System Security Plan (SSP) Development

        

Fortinet Certified Engineers

        

Cyber Security Insured

        

Incident Response Planning

        

CUI Data Encryption & Access Controls

        

Predictable Monthly Billing

        

Onsite Support — Miami Aerospace Corridor

      

    

  

  

  

    

      

        

Aligned with the Frameworks That Govern Aerospace Cybersecurity

        

RRG Networks builds compliance programs around the specific standards and regulations that the FAA and federal oversight bodies require. Our team stays current with NIST SP 800-171 and ITAR requirements to ensure your organization remains compliant and contract-eligible.

      

      

    

  

  

  

    

      

        

Frequently Asked Questions About Aerospace Cybersecurity Compliance

      

      

        

          

          

            

Aerospace suppliers working with government contractors must comply with NIST SP 800-171 and ITAR. Together these frameworks require 100+ security controls covering access control, MFA, continuous monitoring, data encryption, incident response, and documented security policies.

          

        

        

          

          

            

ITAR requires that defense-related technical data be strictly controlled — meaning it cannot be stored, transmitted, or accessed by unauthorized individuals or foreign nationals. From a cybersecurity standpoint, this means implementing strong access controls, data encryption, user activity monitoring, and documented policies that govern how ITAR-regulated data is handled across your systems and cloud environments.

          

        

        

          

          

            

NIST SP 800-171 defines 110 security controls across 14 domains including access control, incident response, identification and authentication, configuration management, media protection, and system and communications protection. Each control must be implemented and documented — and many require ongoing operational evidence to satisfy auditors.

          

        

        

          

          

            

Non-compliance with NIST 800-171 or ITAR can result in loss of existing government contracts, disqualification from new opportunities, removal from the defense supply chain, and potential legal liability for failing to protect CUI or ITAR-regulated technical data.

          

        

        

          

          

            

The timeline depends on the size of your organization and how many gaps exist today. A well-resourced small aerospace supplier typically requires 6–12 months to move from assessment to certification-ready. RRG Networks has helped South Florida aerospace companies complete this process in as little as seven months by following a structured gap remediation roadmap.

          

        

        

          

          

            

Yes. RRG Networks provides end-to-end compliance support for aerospace suppliers — from initial gap assessment and infrastructure hardening to policy development, continuous monitoring, and certification preparation. We start with a free, no-obligation consultation and security assessment. Schedule yours today.

          

        

      

    

  

  

  

    

      

Need Help Meeting Aerospace Cybersecurity Requirements? Contact RRG Networks Today for a Free Compliance Assessment.

      

We’ll evaluate your systems against NIST 800-171 and ITAR requirements — identify exactly where the gaps are — and provide a clear, prioritized roadmap to get your aerospace company compliant and contract-eligible.

      

Business Owners, Call Now: (305) 834-7781

      

        Book Your Free Consultation

        📞 Call Us Now

      

      

        

Cyber Security Insured

        

No Obligation

        

Local to Miami

        

Predictable Monthly Billing

        

Since 2017

      

    

  

  

  

  

  

    

Last updated: March 2026 | RRG Networks Solutions — 12343 SW 132nd Ct, Miami, FL 33186 | (305) 834-7781

  

  

  

    document.querySelectorAll(‘.faq-question’).forEach(function(btn) {

      btn.addEventListener(‘click’, function() {

        var item = this.parentElement;

        var answer = this.nextElementSibling;

        var isOpen = item.classList.contains(‘active’);

        document.querySelectorAll(‘.faq-item’).forEach(function(i) {

          i.classList.remove(‘active’);

          i.querySelector(‘.faq-answer’).classList.remove(‘open’);

          i.querySelector(‘.faq-question’).setAttribute(‘aria-expanded’, ‘false’);

        });

        if (!isOpen) {

          item.classList.add(‘active’);

          answer.classList.add(‘open’);

          btn.setAttribute(‘aria-expanded’, ‘true’);

        }

      });

    });

    document.querySelectorAll(‘a[href^=”#”]‘).forEach(function(a) {

      a.addEventListener(‘click’, function(e) {

        e.preventDefault();

        var t = document.querySelector(this.getAttribute(‘href’));

        if (t) { t.scrollIntoView({ behavior: ‘smooth’, block: ‘start’ }); }

      });

    });

  

Claim Your Free Assessment Today!

Poster promoting a free cyber security risk assessment for small businesses in Florida, offered by RRG Networks.

Free Cyber Security Risk Assessment the first step toward ensuring your organization is protected from costly cyberattacks.

Free Assessment