Understanding Technical Debt
Tech Book Review: “Click Here to Kill Everybody”
I’ve been on a cybersecurity reading kick lately and reading about cybersecurity can be depressing. You learn about damaging hack after damaging hack, endless systemic security issues, and global problems that seem intractable. As an IT consultant...
Shifting Gears: Why Work from Anywhere is Replacing Work from Home
Regardless of where you are in the world, businesseshaveexperienced a major shift during the past few months. When the pandemic first began the main goalwas to figure out how to work remotely. Now that many people have comfortably adjusted, the ...
Cyber Security: Keeping Your Private Information Private
Cyber security is the proactive protection of your data, network and services from the theft and attacks of hackers. Many people do not realize the importance of cyber security and how often cyber trolls are able to access private information. There...
5 IT Best Practices for HIPAA Compliance
If your biotech startup is developing a drug, medical device, or therapy, HIPAA compliance should be part of your long-term plan. Ensuring your IT infrastructure is capable of meeting compliance needs now can save you time, money, and headaches as...