Do you treat all your vendors the same?

Do you treat all your vendors the same?

A survey by the Ponemon Institute found that more than 41% of surveyed companies sustained a data breach caused by a third party. This is a tell-tale sign that third-party risk management should be in everyone’s security arsenal.

read more
The Two-Headed Technology Monster

The Two-Headed Technology Monster

With so many requirements to meet on information security, privacy, and disaster recovery, many community banks do the best they can and sweat through audits to see if they have to take additional action.

read more
Don’t look at your website like a technology professional

Don’t look at your website like a technology professional

It’s so easy to point to a technical limitation as a reason to say, “We can’t do this.” Common sense can go away pretty quickly when trying to work through limitations of what’s easy to do versus what’s right. Hearing those words is a signal to push harder and dig...

read more
Enterprise Resiliency goes beyond Disaster Recovery

Enterprise Resiliency goes beyond Disaster Recovery

Resiliency is more and more being used as a synonym for “disaster recovery” or “contingency planning,” but it’s much bigger than that. True enterprise resiliency goes beyond technology and focuses on the workflow and dataflow within the organization.

read more

Data Centricity

A blog by the Practical IT Innovators at ASMGi.

Data Centricity

ASMGi discovered long ago that the importance of data transcends trends, hype or new approaches. That holds true in security, software development, IT Services, Sales and Marketing Solutions and certainly in the Cloud. Our blog may touch each of our practice areas, but in the end, it's always about the data.