by Kevin Mann | Jul 21, 2025 | CMMC, Cybersecurity
1. Why This Practice Matters AC.L1‑3.1.2 may look deceptively simple (“limit information‑system access to the types of transactions and functions that authorized users are permitted to execute”), but it is the cornerstone of least‑privilege at Level 2 (Its a Level 1...
by Kevin Mann | Jul 14, 2025 | CMMC
Access control is one of the foundational pillars of cybersecurity, especially within Cybersecurity Maturity Model Certification (CMMC). At Level 1, AC.L1-3.1.1 states: “Limit information system access to authorized users, processes acting on behalf of...
by Kevin Mann | Oct 24, 2024 | Cybersecurity, Vulnerabilities
Presently there is a vulnerability in Fortinet’s FortiManager (FMG) CVE-2024-47575 that was exploited in zero-day attacks to steal sensitive files containing configurations, IP addresses, and credentials for managed devices. To help keep your systems resistant to...
by Kevin Mann | Oct 9, 2024 | Cybersecurity
The U.S. National Institute of Standards and Technology (NIST) has updated its Password Guidelines, marking a significant shift in recommended best practices for password management. Here’s a breakdown of the key points and changes from the latest draft of SP...
by Kevin Mann | Aug 23, 2024 | CMMC
Resilient IT, a leader in cybersecurity and compliance consulting and solutions, proudly announces its achievement of Authorized C3PAO (Certified Third-Party Assessment Organization) status. This designation, granted by the Cyber-AB, marks a significant milestone for...