Insights
Insights, field experiences, and general thoughts from our experts.
FortiManager Zero-Day Vulnerability: How to Remediate
Presently there is a vulnerability in Fortinet’s FortiManager (FMG) CVE-2024-47575 that was exploited in zero-day attacks to steal sensitive files containing configurations, IP addresses, and credentials for managed devices. To help keep your systems resistant to...
New NIST Password Guidelines: Key Changes You Need to Know
The U.S. National Institute of Standards and Technology (NIST) has updated its Password Guidelines, marking a significant shift in recommended best practices for password management. Here’s a breakdown of the key points and changes from the latest draft of SP...
Resilient IT Earns Authorized C3PAO Status
Resilient IT, a leader in cybersecurity and compliance consulting and solutions, proudly announces its achievement of Authorized C3PAO (Certified Third-Party Assessment Organization) status. This designation, granted by the Cyber-AB, marks a significant milestone for...
The Forgotten Pillar of Cybersecurity: Why Physical Security Matters
Nowadays, when we think about cybersecurity, our minds often jump to firewalls, encryption, and malware protection. While these digital defenses are undoubtedly crucial, there's one aspect of cybersecurity that often gets overlooked: physical security. Physical...
The CMMC Preparation Guide: Achieve Compliance With Ease
Are you feeling the pressure of the impending Cybersecurity Maturity Model Certification (CMMC) assessment? Don't worry – we've got you covered! Introducing our brand new CMMC Preparation Guide, meticulously crafted by Certified CMMC Assessors, to equip your team with...
Strengthening Cybersecurity: The Power of Documentation
In the fast-evolving landscape of cybersecurity, staying ahead of threats requires more than just cutting-edge technology. It demands a comprehensive strategy that encompasses not only sophisticated tools but also well-defined policies and procedures. One...
Keeping Your Cybersecurity Strong: Why Audits and Monitoring Are Key
In today's world, where cyber trouble seems to be around every corner and data leaks can be a total nightmare, making sure your sensitive info stays safe is crucial, especially for DoD contactors and small businesses. Cyber threats keep changing, so it's crucial to...
Resilient IT is a Candidate for C3PAO Accreditation
As you should know by now, we have been focused on helping companies prepare for NIST 800-171 / CMMC. We've spent countless hours training, attending events, and networking, developing relationships with well-respected individuals in the space. We had been focused on...
Protect Your Password Manager
If you're using a password manager, you're already on a great track towards owning your own cybersecurity. If not, should strongly consider using one. However, nothing's perfect and threat actors are always searching for new and creative ways to steal your data. Many...
“An Enclave Solves Everything”
Kevin and Jacob discuss whether or not an Enclave can be the answer to your CMMC challenges.