by Kevin Mann | Jun 7, 2024 | CMMC, Cybersecurity
Are you feeling the pressure of the impending Cybersecurity Maturity Model Certification (CMMC) assessment? Don’t worry – we’ve got you covered! Introducing our brand new CMMC Preparation Guide, meticulously crafted by Certified CMMC Assessors, to equip...
by Kevin Mann | May 29, 2024 | Business, Cybersecurity, Documentation
In the fast-evolving landscape of cybersecurity, staying ahead of threats requires more than just cutting-edge technology. It demands a comprehensive strategy that encompasses not only sophisticated tools but also well-defined policies and procedures. One...
by Kevin Mann | May 20, 2024 | Business, Cybersecurity
In today’s world, where cyber trouble seems to be around every corner and data leaks can be a total nightmare, making sure your sensitive info stays safe is crucial, especially for DoD contactors and small businesses. Cyber threats keep changing, so it’s...
by Kevin Mann | Oct 5, 2023 | Cybersecurity
If you’re using a password manager, you’re already on a great track towards owning your own cybersecurity. If not, should strongly consider using one. However, nothing’s perfect and threat actors are always searching for new and creative ways to...
by Kevin Mann | Feb 13, 2023 | Cybersecurity, Modern Workplace
At Resilient, we often leverage Microsoft Intune to empower device management, configuration, and security no matter where you may be working. Microsoft Intune is a powerful Mobile Device management program, based in the cloud, which maintains compliance and...
by Kevin Mann | Jan 21, 2023 | CMMC, Cybersecurity
As an organization who focuses on compliance, specifically NIST 800-171 and CMMC, we found ourselves in a predicament when it came to aligning the systems we use to support clients with the requirements in NIST/CMMC – the dreaded FIPS mode. In this article we will...