View Post

3 Ways to Detect and Fix Costly Technology Processes 

Unlike the famous cartoonist, Rube Goldberg, most people cannot become famous or make a living taking a simple process and making it so complicated it defies definition.  Almost all of us that have worked at an organization for more than a few months can identify a few processes that are followed diligently every day wasting tremendous amounts of time and …

View Post

Avoid Bankruptcy Due To Poor Security with These 3 Steps

If you are like nearly 90% of small and medium size business owners, you probably have said or at least thought “what are the odds that a security breach would happen to me?”. According to a 2018 study by the Ponemon Institute, 67% of small and medium size businesses have experienced a cyber-attack in the past year and 58% have …

View Post

Security Assessments 101 – February 19, 2020

Hosted by: Tom Nohelty & Kris Cears from Applied Tech, and Evan Francen from Security Studio Learn why completing a security assessment is important and what a good assessment looks like. Fill out the form to watch the recording.

View Post

User Group Meeting 2020

Mark your calendar for Wednesday October 7th! For the past 2 years, we’ve held the Applied Tech’s user group meeting. We’ve had great presentations from the Applied Tech staff and high interaction from the users. Everyone was engaged and enthusiastic all day long. Attendees unanimously rated it as a “Very Useful” experience. All in all, the event is always a …

View Post

4 Practical Steps to Successful Change Management 

It’s just a couple days into the new year and I am already falling behind on my promise of increased gym time.  Each year it seems good intentions are met by reality and it is easy to revert to my comfort zone.  Do you feel that way with some of your best intentions at work?  A recent McKinsey study found …