
Hosted by: Tom Nohelty & Kris Cears from Applied Tech, and Evan Francen from Security Studio
Learn why completing a security assessment is important and what a good assessment looks like.
Fill out the form to watch the recording.
Learn why completing a security assessment is important and what a good assessment looks like.
Fill out the form to watch the recording.
The Resource Hub
Visit our Resource Center for up-to-date news and stories for technology and business leaders.
We are excited to shine a light on Todd Younkin, an invaluable member of our team and the Team Lead at Applied Tech. Hailing originally from State College, PA, Todd brings a wealth of experience and leadership to our dynamic environment. Todd's professional journey encompasses diverse roles, from his early days working IT in a hotel to a library. Todd's education has been a blend of hands-on...
This month, we are excited to shine the spotlight on Mikaela Norgard, a Systems Technician based in Fargo, North Dakota. Mikaela’s journey in the tech world started with diverse experiences, from bartending in a local downtown bar to teaching music theater to K-12 students. Mikaela’s educational foundation was laid in Fergus Falls, Minnesota, where she graduated from Kennedy Secondary High...
This month we are shining a spotlight on one of the outstanding members of the Applied Tech team, Nick Tesi. Nick brings a wealth of experience and a diverse skill set to his role, making him an invaluable asset to our organization. Nick’s journey to his current position as vCIO and Account Manager at Applied Tech is nothing short of remarkable. His career path has included various roles such as...
The standard internet user will access several websites and applications on any given day. Each one of these different accounts will highlight the importance of not repeating passwords, and many even require a combination of letters, numbers, and symbols. The trouble with this, however, is that if we were to have a unique password for each online account that meets the complexity requirements,...