Contact
Let's Talk

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Feature

Government Contractors

How to Get Your CMMC Certification Across the Finish Line

Reports show that government contractors are one of the largest targets for hackers. Businesses that fall victim to a cyber attack could face loss of contracts, reduced funding, significant reputable damage or substantial recovery fees. Most government contracts require FISMA (Federal Information Security Management Act) and NIST (National Institute of Standards and Technology) compliance to prevent security and cyber breaches.

Read More

Blog Feature

Healthcare

The Simple 6-Step Process: Procure-to-Pay Overhaul for Your Long Term Care Facility

Whether you are a single site skilled nursing facility or a retirement community with hundreds of buildings, your purchase-to-pay process could probably use some fine tuning and automation. Perhaps it’s even in need of a complete overhaul. If you are looking to get the most out of your purchasing and invoice process, then you’ve come to the right place. We'll use one of our favorite solutions, PointClickCare, as a model for this process.

Read More
Subscribe to our blog

Subscribe To Our Blog

With your blog subscription, you'll get a free cyber security awareness guide for you and your team.

Blog Feature

Cloud Productivity and Collaboration  |  Home Cyber Security

How to Write an IT Plan: A Quick Guide for Business Owners

If you were fortunate, you were able to pivot your business to have your employees work from home quickly at the onset of the pandemic. As the crisis emerged, business owners scrambled to set-up remote access and patch together what was needed to ensure their employees could work from home successfully.

Read More

Blog Feature

ERP and CRM Systems

Be in the Know: Three Notable Sage Updates

Version 2020.2 of Sage 300 is now available.

Read More

Blog Feature

Government Contractors  |  Home Cyber Security

Four Best Practices for Secure Remote Work

As the number of remote workers continues to rise, there are a handful of safety practices that all business owners, IT managers, and employees should be thinking about. Here are the most important practices to keep in mind.

Read More

Blog Feature

Cloud Productivity and Collaboration  |  Fresh Ideas

Hindsight is 2020

This horrific pandemic has made many business owners wish they would have moved their financial and operational systems to the cloud, or at least thought of how they could access information remotely.

Read More