The SOC 2 Catch 22 That Holds Small Companies in Place (And 7 Steps To Break Free) Written by Angela Akerman on May 13, 2026
Good Business, Bad Timing (How Market Conditions Override Performance More Often Than Owners Expect) Written by Hanny Akl on May 8, 2026
Ransomware and Municipal Governments: Risks, Impacts and Practical Responses Written by Justin Headley on April 28, 2026
Protect Your Tech: Ways to Ensure the Safety of Your Company and its Technology Written by Emily Jones on June 29, 2021 View
How the Cloud Saved Thousands of Businesses from a Cyber Attack (and How Cloud Business Solutions Can Save Yours Too) Written by Emily Jones on April 6, 2021 View
Does Your Company Use Microsoft’s On-Premise Exchange Server? [How to Respond to the Microsoft Hacking Incident] Written by Emily Jones on March 15, 2021 View
Cloud Computing and the R&D Tax Credit [Answers to Frequently Asked Questions] Written by Warren Averett on October 14, 2020 View
Four Myths Business Leaders Believe about IT Security [Plus the Reasons Why They Aren’t True] Written by Emily Jones on August 17, 2020 View
8 Ways to Make Sound Technology Decisions for Your Organization Written by Amy Williams on October 30, 2019 View
The Basic Building Blocks of Blockchain [Laying a Foundation for What Companies Need to Know] Written by Kevin Wang, Dana Canterbury on August 21, 2019 View
Vulnerability Scans And Penetration Tests: What Are They And Why Do I Need Them? Written by Warren Averett on July 19, 2019 View
ISA Training: Frequently Asked Questions about Decoding PCI Self-Assessments Written by Warren Averett on July 10, 2019 View
Is Your Insurance Company Ready for Changing Technology Regulations? [Implications of Alabama Act 2019-98] Written by Paul Perry on May 30, 2019 View
Warren Averett Technology Group: Responding to the Alabama Data Breach Notification Act and What to Do if a Breach Occurs Written by Warren Averett on April 18, 2018 View