Blog

Subscribe to Our Blog

3 Minute Read

Why the Right Metrics Matter

If you don’t think curling up with the latest issue of the Journal of Econometrics is the recipe for a fun weekend, you may not have heard of the Sokal hoax. In the 1990’s, a mischievous physics...

Posted by

Read More
3 Minute Read

Cybersecurity Threats in Your Emails, Texts, and Social Encounters

What’s wrong with an email that starts with “Dear valued customer”? Over 70% of businesses have been hit with a phishing attack, and data has been compromised. Your first red flag may be an email...

Posted by

Read More
4 Minute Read

If You See Something, Say Something: How to Recognize a Cyber-Attack

We’ve all heard "if you see something, say something," especially if you live and work in the DMV region. That notable quote began almost two decades ago during a Department of Homeland Security...

Posted by

Read More
2 Minute Read

Your Cyber Insurance and MFA Requirements

If your organization has a cyber insurance policy, you may have noticed a new requirement. Your insurance agent may have recently called to review your cyber security protocols. If you do not yet...

Posted by

Read More
4 Minute Read

Three Red Flags to Avoid in Your IT Strategy [VIDEO]

One of the best parts of my job is that I meet a wide variety of business and non-profit leaders each week to learn how IT impacts their organization and to share my perspective. This unique vantage...

Posted by

Read More
4 Minute Read

How to Rate Your IT Managed Service Provider [VIDEO]

Students shouldn’t be the only ones nervous about report cards. With IT becoming such an integral part of the DNA of every organization, isn’t it time to evaluate your MSP (managed service provider)...

Posted by

Read More