NIST 800-171 is a set of cybersecurity standards designed to protect sensitive information within non-federal systems and organizations. Whether you’re a contractor, small business, or educational institution, implementing these 110 controls across 14 families strengthens your cybersecurity posture and ensures compliance with federal requirements. Below is a simplified checklist to […]
CMMC Compliance: A Path To Securing DoD Contracts
The Cybersecurity Maturity Model Certification, otherwise known as CMMC is a framework created by the U.S. Department of Defense to ensure that contractors and subcontractors within the Defense Industrial Base protect sensitive information, such as Controlled Unclassified Information. Achieving CMMC compliance is now a critical requirement for organizations seeking to […]
From Home-Grade to Enterprise: How We Modernized a Client’s Network
Picture a business running critical operations on a network designed for a small home: consumer-grade Google Access Points with spotty coverage, sluggish speeds, and no centralized security. This was the reality for one of our clients—until they partnered with us to overhaul their infrastructure with enterprise-grade Palo Alto firewalls and […]
How We Implemented Monitoring for a Small On-Premises Environment
For many businesses, IT issues often go unnoticed until they start impacting end users, and the IT Support inbox blowing up. This was exactly the case for one of our clients, who had a small on-premises footprint of around 12 servers but no monitoring or observability in place. A server […]
How We Centralized IT for a Client with Intune
Imagine a business with no centralized IT infrastructure—local user accounts on every device, no unified security policies, and even a locked-out laptop due to a fired employee withholding the PIN. This was the state of one of our recent clients. Luckily, they had existing Microsoft Intune licenses, they just weren’t […]
Strengthening Cybersecurity
In today’s digital landscape, every organization, regardless of the industry, is a potential target for cyberattacks. Sensitive data, operations, and customer trust are all at stake. A single breach can lead to significant financial losses, damage to brand reputation, and legal repercussions. To mitigate these risks, organizations must adopt a […]
Migration to M365 GCC High
What is GCC High? Microsoft 365 GCC High is a DoD cloud environment for DoD personnel, federal agencies, and cleared contractors. It meets FedRAMP High requirements and runs on Azure Government for enhanced security. Available only to U.S.-based organizations that meet strict eligibility criteria, it ensures ITAR-compliant data residency with […]
Azure Functions API
To deepen my understanding of how APIs work and to gain hands-on experience , I decided to build my own API using Azure Functions and their serverless architecture. I initially considered doing it with Azure Cosmos, but this took me a few days, and having Azure Cosmos DB running for […]
FileUploaderCLI Tool
For fun, I decided to make a CLI tool for bash that helps speed up the process a bit for uploading files into an Azure storage account. Features Prerequisites To use this tool, you must have: Installation Steps Clone the repo from github: Ensure the azure cli is installed: How […]
Configuring Cisco Switch with VLANs
Let’s say you want multiple LANs, but only have one switch? Or maybe you want to separate your networks into smaller sections, with each one having a different purpose? One for your trusted devices, one for Guest access, one for management, etc. How can you do this? This can be […]