Category Archives: Continuing Education

Business Operating System

Business Operating System: The Key to Scaling

What is a Business Operating System?  Choosing the right business operating system is like finding a key for your success. It ensures everyone in your company is on the same page. Think of it as the DNA of your organization. It outlines day-to-day practices and aligns with your goals.  Let’s say you’re running a small […]

Choosing the right cloud provider

Choosing the Right Cloud Provider

Navigating the realm of cloud computing can be a daunting task, especially with the plethora of service providers available today. As businesses increasingly shift to the cloud, making an informed choice becomes paramount. Here’s a guide for choosing the right cloud provider and making that decision with confidence.  The Industry Leaders: AWS, Google Cloud, and […]

Explain it like I'm five - cloud edition

Explain It Like I’m Five – Cloud Edition

Ever been in a meeting where someone drops a cloud-related term, and everyone nods while you’re secretly Googling under the table? No judgment here; we’ve all been there. The cloud world is packed with jargon that can make anyone’s head spin. But fear not! We’ve got your back. Let’s break down some of that fancy […]

Security Awareness Training for Employees

Security Awareness Training For Employees 

We all know that talking about cyber security can be very overwhelming for the average person. Creating a culture of security awareness training for employees is important. We all use the internet, and it is this massive jungle with threats, threat actors, and malicious activity. That is exactly where Security Awareness Training steps in. It […]

IT Plans, Assessments and Asset Management

IT Plans, Assessments, and Asset Management

IT plans, assessments, and asset management are the foundation of any IT department.  The scope is typically vast and spread across technologies, business areas, and people.  Developing a strategic plan is a critical asset for the business as it outlines how IT will support the key business goals set by your company. It also describes […]

HIPAA Security Risk Assessment Template

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities and their business associates conduct a risk assessment of their healthcare organization. A risk assessment helps your organization ensure it is compliant with HIPAA’s administrative, physical, and technical safeguards. A risk assessment also helps reveal areas where your organization’s protected health […]

Common Cyber Attacks and 5 Tips on How to Stop Them

Do you remember iconic films like Hackers, WarGames, or The Matrix? In each, we watched computer whiz after computer whiz work magic on a keyboard to hack some corporation, win a game, or download extra Kung Fu knowledge and beat the bad guys. Movies about cybersecurity and computer hacking seem to have slipped into the […]