In the fast-moving world of IT, it always pays to keep up with what's new in the industry and how it can benefit your business. This is why Charles IT helps you stay up to date with an informative blog and resources that take your IT knowledge to the next level. Watch our webinars, take a look at our library of eBooks and our free network audit, or schedule your vulnerability assessments today to stay ahead of the curve.


Top Ways to Protect DFARS Contracts with Foster Charles

Learn about protecting your DFARS contracts!

Obtaining DoD contracts is one thing, but keeping them and maintaining them is just as important. Make sure you take the proper steps! Watch as Foster Charles explains the top ways to protect your DFARS contracts!

Watch the webinar now!


Foster Charles

CEO & Founder

Why Still Focus On DFARS Webinar with Mike Bailie

Learn about the clauses of DFARS and why they are still important!

With the addition of CMMC into DoD compliance, it is important not to forget about the essential backbone of DoD compliance, DFARS! Watch as Mike Bailie reviews the DFARS clauses and why it is important to keep DFARS in your focus!

Watch the webinar now!


Mike Bailie

Team Lead & Project Manager

HIPAA Remote Workforce Webinar with Aaron Bandzes

Learn about the HIPAA best practices for your remote workforce!

With many companies implementing work from home policies, it is important to know where to focus your attention when it comes to staying HIPAA Compliant. Aaron goes over the best practices for HIPAA remote working in this webinar!

Watch the webinar now!


Aaron Bandzes

Service Director

HIPAA Gaps Webinar with Tom Tetrault

Learn about the top 5 HIPAA security gaps to look out for!

With most sensitive data being held electronically in today's age, it is important to know where to focus your attention in order to keep the data safe. Watch our webinar as Charles IT’s Team Lead & Project Manager, Tom Tetrault, explains the top gaps for HIPAA compliance.

Watch the webinar now!


Tom Tetrault

Team Lead & Project Manager

SOC 2 Webinar with Foster Charles

Learn about SOC 2 compliance and how it can benefit your organization.

More and more business contracts are starting to include compliance requirements to show that data is secure. Watch our webinar as Charles IT’s Founder & CEO, Foster Charles, explains what SOC 2 is and how to get started in the process.

Watch the webinar now!


Foster Charles

CEO & Founder

IT Budgeting Webinar with Sal Marino

Learn what to include in your annual IT budget to be prepared for the unexpected.

In today’s cybersecurity climate, companies cannot afford to take risks. Your IT budget should include efforts to protect your company data. Join us as Charles IT’s Finance and Operations Manager, Sal Marino, explains what is crucial to keep in mind when creating your IT budget.

Watch the webinar now!


Sal Marino, CFE

Finance & Operations Manager

CMMC Webinar with Mike Bailie

Find out what steps to take now to be in compliance with the DoD’s new security standards.

Charles IT's own Michael Bailie, CISSP and Team Lead, explains what actions you can take now and answers your most pressing questions in this interactive webinar. You’ll learn exactly what this shift will mean to your company so that you can get back to business.

Watch the webinar now!


Mike Bailie, CISSP

Team Lead & Project Manager




Network Assessment

Do you feel that your business could be achieving more? Do you think your technology is holding you back and not helping you grow? Our network assessment will identify areas of weakness and potential danger spots in your company’s IT systems.

And that’s not all - our assessment is no-nonsense, unbiased, has no strings attached and is completely FREE.

Get your FREE network assessment now!

Vulnerability Assessment

However much you plug and patch your IT systems, update anti-virus software or firewalls, there will always be some weakness you will have overlooked or some system insecurity that people can exploit.


This is why Charles IT offers vulnerability assessments to help you find and block any security holes and keep your systems safe. We offer:

  • Instant and regular scans that look for vulnerabilities on your websites, server based softwares, web-based applications and network ports.
  • An In-depth Analysis report that lists the many goals such as critical vulnerabilities which should be dealt with instantly and recommendations of what action to take.
  • On-demand functions that will check that any vulnerabilities have been solved.

Schedule your Vulnerability Assessment today

Want to be more productive? Our new Office 365 eBook will introduce a host of new features you can use to supercharge your business.Read it now