Thought Leadership

Server Room

Improve Your Data Center Management with DCIM

In October 2018, Brittany George of Weaver participated in an AFCOM Leaders Lab focused on improving data center management. The group examined technical, environmental and human factors that can disrupt data center operations and considered solutions to those problems.

Learn More

Virus Alert

Are You Prepared for a Cyber Breach?

In today’s tech-driven world, where data breaches regularly break into headlines, every organization should have a cyber incident response plan. Unfortunately, too many organizations fail to create — and practice — such plans.

Learn More

Tablet & Phone On Laptop

Risk Versus Convenience: Crafting Effective BYOD Policies

Salespeople who travel, customer service reps who work from home, and managers who use mobile devices to perform business tasks may all appreciate the flexibility of a bring-your-own-device (BYOD) policy.  Manufacturers may put themselves at risk, though, in allowing access to their systems on an…

Learn More

Coding Numbers

Do You Spend More Time Collecting Data Than Analyzing It?

According to a recent survey by the Association of International Certified Professional Accountants, more than one-third of companies spend more time collecting data than analyzing it. Only 11% of executives say they are using artificial intelligence (AI). Overall, the report concludes that finance…

Learn More

Keyboard & Mouse

Does Your Website Point to an Imposter?

You count your website as an asset, right? It is the digital front door to your business and the great web address you invested in, MyCompany.com, makes it so convenient for visitors to find. The only problem is that your digital moniker could have been hijacked.

Learn More

Computer Circuit

Are You Ready for the New Trust Services Criteria?

If your company reports under AICPA SOC (System and Organization Controls) 2, you should already be preparing for the new guidance and updated Trust Services Criteria (TSC) that take effect for periods ending after December 15, 2018.

Learn More

circuit board

Secure the Keys to Your Kingdom

Uncontrolled user access undermines every other security measure. Your organization’s most critical systems and data must be accessible to be useful.

Learn More