7 Restaurant Finance Best Practices for Increasing Cash Flow Written by Branden Crosby on October 4, 2023
What Is My Company’s Cybersecurity Posture? (Plus 10 Ways To Improve It) Written by Paul Perry on October 4, 2023
Carol Phillips Recognized as One of the Birmingham Business Journal’s 2023 Top Birmingham Women October 3, 2023
Does Your Company Use Microsoft’s On-Premise Exchange Server? [How to Respond to the Microsoft Hacking Incident] Written by Emily Jones on March 15, 2021 View
Four Questions to Ask in Your Year-End Evaluations to Set Your Company’s Technology Up for Success in 2021 [Plus Tech Tips for the New Year] Written by Emily Jones on October 19, 2020 View
Cloud Computing and the R&D Tax Credit [Answers to Frequently Asked Questions] Written by Warren Averett on October 14, 2020 View
Four Myths Business Leaders Believe about IT Security [Plus the Reasons Why They Aren’t True] Written by Emily Jones on August 17, 2020 View
What Should Municipalities Know about Ransomware? [Three Takeaways from the City of Florence Ransomware Attack] Written by Justin Headley CISSP, CISA on July 1, 2020 View
The Data Analytics War Room: Lessons Learned from the COVID-19 Pandemic Written on June 12, 2020 View
A Revenue Recognition Primer for SaaS Providers: Finding Insights in Recognizing Revenues Under ASC 606 Written on February 26, 2020 View
8 Ways to Make Sound Technology Decisions for Your Organization Written by Amy Williams on October 30, 2019 View
The Basic Building Blocks of Blockchain [Laying a Foundation for What Companies Need to Know] Written by Kevin Wang, Dana Canterbury on August 21, 2019 View
Vulnerability Scans And Penetration Tests: What Are They And Why Do I Need Them? Written by Warren Averett on July 19, 2019 View
ISA Training: Frequently Asked Questions about Decoding PCI Self-Assessments Written by Warren Averett on July 10, 2019 View
Is Your Insurance Company Ready for Changing Technology Regulations? [Implications of Alabama Act 2019-98] Written by Paul Perry on May 30, 2019 View