Blog Bg Image

Information Technology

Blog Post Image

The Hidden Risk in Medical IT: Why HIPAA Compliance Fails Without Proper Management

Medical practices face heightened cyber risk and stricter HIPAA enforcement, making proactive, well-documented IT management essential for protecting ePHI, avoiding costly fines, and ensuring secure, compliant continuity of patient care.

Read More
Blog Post Image

CMMC for A/E/C Firms: Practical Impacts, Real Challenges, and What to Expect

CMMC compliance is now a tangible, impactful requirement for A/E/C firms supporting the DoD. CAD-heavy workflows (AutoCAD, Revit, Civil 3D) make it far more complex than simply “locking things down.” One way to be successful in CMMC Level 2 implementation is a virtual enclave where CUI is separated from non-CUI, collaboration is secure, and there are robust file-transfer processes that protect data without destroying engineering productivity.

Read More
Blog Post Image

A Note About Cookies

A summary of how to stay safe online, plus our favorite holiday treats

Read More
Blog Post Image

How to Know If Your Current Managed Service Provider Can Deliver CMMC Compliance Support

While it’s certainly possible for your current MSP to manage your IT in a way that enables CMMC Level 2 compliance, the toolset and knowledge required is highly specialized and your average MSP may not be up to the task.

Read More
Blog Post Image

Implementing CMMC Level 1: Asking the Right Questions

With the Level 1 Cybersecurity Maturity Model Certification (CMMC) becoming required on Department of Defense (DoD) Contracts containing Federal Contract Information (FCI) sometime between late October 2025 and February 2026, it is important for those companies working with the DoD to establish their current cybersecurity maturity and standing against the new requirements.

Read More