TAG Announces the Top 40 Innovative Technology Companies in Georgia

Media Contact:

Russ Davis – russ@tagonline.org

(404) 920-2023

TAG Announces the Top 40

Innovative Technology Companies in Georgia

ATLANTA (April 13, 2022) – Each year, the Technology Association of Georgia (TAG) unveils the Top 40 Innovative Technology Companies in Georgia. This year, there are actually 41, as two companies tied for a spot on this prestigious list.

TAG’S Top 40 Awards, sponsored by Amazon Web Services, Best Buy and Comcast Business, recognize Georgia-based technology companies for their contribution to innovation and economic growth within the state of Georgia’s technology sector.

“TAG is pleased to recognize these top technology companies that help positively impact Georgia’s innovation economy,” said Larry K. Williams, President and CEO of TAG. “By Elevating, Innovating and Activating strategies that support the vast technology ecosystem, these companies help advance our state’s position on the global technology stage.”

TAG accepted nominations for Top 40 earlier this year. Nominations came from individuals in their respective companies or from external public relations agencies. The TAG Top 40 committee, comprised of esteemed technology and investment leaders, presided over the judging of applications. Judges reviewed applications based on the company’s innovation; the market need that their innovation addresses; and how the innovation benefits the Georgia technology economy.

-More-

The 2022 Top 41 Innovative Technology Companies are:

• Atomic-6, LLC.

• Automation Intelligence

• Azalea Health

• Banyan Hills Technologies

• Carpool Logistics

• Clean Hands – Safe Hands

• ClickDimensions

• Cooleaf

• Curricula

• DataSeers

• FI Navigator Corporation

• FlowPath

• GoFan

• Inclusivv

• Intradiem

• Kobiton Inc.

• MacStadium

• Managr

• MapHabit, Inc.

• MaxRewards

• Montra

• NuGen Systems

• OneVizion

• Optimal Technology Corporation

• OXOS Medical

• QGenda

• RightData, Inc.

• RoadSync

• Safely

• SemiCab Inc.

• Sonar

• Southern Company

• eStreamly

• Synovus Financial Corp.

• TechSera, Inc.

• Verusen

• Vital4

• Vouch.io

• Voxie

• Ware2Go

• WasteWizer Technologies

Companies selected to the Top 40 will have the opportunity to showcase their company’s work at the Georgia Technology Summit’s exhibition April 26-27, 2022 at the Georgia World Congress Center in downtown Atlanta.

“This year’s Top 40 companies represent a wide range of technology industries that power Georgia’s innovation economy,” said Dennis Zakas, Georgia’s Top 40 Innovative Company Awards Chair. “Based on the quality of the winners and the history of the award, it’s likely that some of today’s Top 40 companies will be the unicorns of tomorrow.”

For more information about the 2022 Georgia Technology Summit and to register for the event, visit https://GeorgiaTechnologySummit.com. Follow the conversation on Twitter through #GTS2022.

-More-

About the Technology Association of Georgia (TAG)

TAG’s mission is to Connect, Promote, Influence and Educate Georgia’s technology ecosystem to advance the innovation economy. Through those four foundational strategies TAG serves the technology community, helping to support, grow and ignite tech leaders, companies and the overall Georgia economy.

TAG serves more than 30,000 members statewide through regional chapters in Metro Atlanta, Augusta, Columbus, Macon/Middle Georgia, and Savannah. TAG hosts more than 150 events each year and serves as an umbrella organization for 26 professional societies.

TAG provides networking and educational programs; celebrates Georgia’s technology leaders and companies, and advocates for legislative action that enhances the state’s economic climate for technology.

Additionally, the TAG Education Collaborative (TAG-Ed) focuses on helping science, technology, engineering and math (STEM) education initiatives thrive.

For more information visit the TAG website at www.tagonline.org. To learn about the TAG-Ed Collaborative visit www.tagedonline.org.

###

12 Cyber Readiness Strategies #7 and #8

In our last blog post, we discussed cyber readiness strategies: #5 Back-Up Everything and #6 Don’t Neglect Compliance. Continuing our series this week are discussing strategies #7 and #8, Continuous Network Intelligence and Security Awareness Training. In 2021 businesses suffered 50% More Cyberattack Attempts per Week in 2021 and as a business owner, it is not only important to continuously monitor your networks for any suspicious activity, but also to prepare employees for any type of cyber attack 

7. Continuous Network Intelligence

Technology is always changing and advancing, which can mean new vulnerabilities for your organization. Staying on top of these changes is critical to reducing the risk of a cyberattack. This is where continuous network intelligence comes in. By monitoring your network and systems continuously, you can quickly identify and patch any vulnerabilities. In fact, continuous monitoring is one of the best ways to detect a cyber-attack early. One of the strategies attackers will use is ransomware attacks. What is a ransomware attack? A ransomware attack is when an attacker encrypts your data and demands a ransom to decrypt it. These attacks can be devastating to businesses, as they can lose critical data and be forced to pay a ransom. To prevent these attacks, it is important to set up your network to detect access from outside sources. As soon as anyone outside your network enters, you will be able to kick them out before they can cause harm. If you don’t have monitoring tools in place already there are a few ways to start implementing continuous network monitoring: 

  • Use a network security solution that provides real-time visibility into your network traffic and activity. 
  • Keep systems up-to-date by continually watching for OS and application security updates and patching the systems as soon as reasonable. 
  • Conduct regular penetration testing to identify any weaknesses in your system. 

By continuously monitoring your network, you can quickly identify and patch any vulnerabilities. This will help reduce the risk of a cyber-attack and keep your business running smoothly. 

8. Security Awareness Training 

In addition to continuously monitoring your networks, it is also important to prepare employees for any type of cyber attack. This is where security awareness training comes in. Around 91% of breaches started with a phishing attack and 81% of cyber-attacks are related to stolen or weak passwords. By educating employees on the latest cybersecurity threats and how to prevent them, you can reduce the risk of a successful attack. There are a few things to keep in mind when creating a security awareness training program. 

  • Make it mandatory for all employees. 
  • Keep it up-to-date with the latest threats. 
  • Test employees regularly to ensure they are understanding the material. Examples of this include: 
  • Computer-based awareness training 
  • Phishing simulation exercises 
  • Awareness campaigns 
  • In-person security awareness training 
  • Monthly notifications or newsletters 

By following these tips, you can create a security awareness training program that will help keep your business safe. And by educating employees on the latest cybersecurity threats and how to prevent them, you can reduce the risk of a successful attack.  

These are just a few of the many precautions that should be taken to protect your business from a cyberattack. If you would like more information or have any questions, contact Montra at sales@montra.io

 

Building a Multi-Layer Security Strategy Infographic

Building a Multi-Layer Security Strategy

Is your business ready to handle a targeted cyber-attack? Maybe you have been attacked and don’t even know it. According to the 2020 Thales Data Threat Report, 49% of US companies have already experienced a data breach. To help you become more proactive and effective at defending against cyber threats, we have created an infographic to provide you with the basis for compliance for 12 privacy and cyber security frameworks 

Six Steps to Successful Employee Offboarding

When an employee leaves a company, offboarding is the process of ensuring that they have a smooth and secure transition from their current role to their next one. This includes tasks such as ensuring that all their accounts are closed and transferred, returning all devices and that the former employee can proceed easily to their new job.  

Employee off-boarding is critical not just for securing company data, but also for maintaining a safe workplace. A recent study has shown that about 89% of employees still had access to their company’s network and data after termination and around 83% continued to access their old employer’s accounts. With insider cyber-attacks rising by 44% over the past two years, it is more critical than ever to properly off-board employees after they leave your company. 

Here are some of the key steps involved in successfully offboarding an employee along with some of the best practices for making the process smoother.  

1. Disable all accounts and change passwords

One of the first steps in offboarding an employee is to disable their user accounts and change any passwords they may have had access to. This helps to ensure that the former employee does not have any access to company data or systems. Additionally, it is important to update any additional identity security measures such as multi-factor authentication that the employee may have been using. 

2. Collect company-owned devices

The next step is to collect any company property that the employee may have, such as phones, laptops, keys, or ID badges. It is important to do this as soon as possible so that the employee does not have access to company resources. Additionally, you should check with the employee to make sure that they have not taken any confidential information with them. If an employee is working remotely, you will need to arrange for someone to collect their devices from them or have the employee ship their devices back. 

3. Securely erase company devices

Either remotely or when the company devices are returned, securely erase the information on those devices. This will ensure that any company data on the devices cannot be accessed by the former employee. Once this is done you can prepare the devices for use by a new employee.

4. Contact Third-Parties

You should also notify any customers, partners or vendors, with whom the employee worked and provide them with the new contact information for your company. This will ensure that there are no potential information issues and that third-parties are able to continue working with your company without interruption.

5. Update your company’s HR records

Finally, you will need to update your company’s HR records to reflect the employee’s departure. This includes removing them from any health insurance or other benefits they may have been receiving. You will also need to update their contact information and emergency contact information. Once this is done, you can send out a farewell message to current employees. Additionally, by keeping open communication with the departing employee, you can help to make the transition as easy as possible for them. 

6. Follow cyber-compliance policies

When offboarding an employee, it is important to make certain you are operating within compliance of any relevant cyber-security regulations. For example, the National Institute of Standards and Technology Cyber Security Framework (NIST CSF) requires companies to take specific measures when deleting employee data. Additionally, ISO 27001 is a standard for information security management and requires companies to have a plan for terminating employees. The Health Insurance Portability and Accountability Act (HIPAA) requires companies to protect the privacy of employee health information. By following all applicable regulations, you can help to ensure that your company complies when offboarding employees. 

You can make sure that your company’s offboarding procedure is effective and safe by following these procedures. Whether an employee leaves your company by their choice or yours, offboarding them as quickly and efficiently as possible is key to limiting any exposure of your business to a disgruntled former employee. By following these tips, you can minimize the amount of time they have access to your IT systems and ensure that they depart on good terms. If you have any questions about how to execute these tips or would like help with offboarding your employees, feel free to reach out to us at sales@montra.io. 

Microsoft OneDrive – Eight Ways to Get the Most from It

When it comes to file storage and sharing, there are a lot of different options out there. Microsoft OneDrive is a cloud-based storage and synchronization service offered by Microsoft. It allows users to store files in the cloud, share files with others, and sync files across devices. With its many features, it can be difficult to know how to get the most out of the service. In this post, we will cover topics such as best practices, how to share and sync across devices, restore files, and collaborate with others. 

Some of the best features of Microsoft OneDrive are: 

1. You can store up to 5GB of data for free: This is a great option for those who don’t want to pay for storage or who are just starting out and don’t have a lot of files to store. 

2. It integrates well with Microsoft Office programs: If you are a Microsoft Office user, OneDrive will integrate well with your programs and make it easy to save files to the cloud. You can also access your files from any device, including phones, tablets, and computers. 

3. You can share files and folders with others and set permissions: This is a great way to collaborate with others. You can give others access to specific files and folders, or you can share your entire OneDrive account with them. 

While there are many great features, there are also some potential downsides. The primary pain points customers have with OneDrive are: 

1. The Interface Can be Confusing 

This is especially true for those who are not familiar with Microsoft Office programs. Whether you’re migrating from another cloud-sharing service or starting from scratch, there are a number of onboarding tutorials your employees can use to become well-versed with OneDrive’s features. 

2. Syncing files between devices Can be Difficult to Setup 

This can be a problem if you have different devices, such as a phone and a computer, and you want to keep the files on both devices. The OneDrive app is the best way to sync all your files, but it can be confusing to setup and often requires a power user or IT administrator to get it going properly.

3. File and Folder Names are different between Mac and
Windows users 

This can be confusing for users who are used to the naming conventions of one OS or the other. OneDrive follows the naming rules for Windows devices and will stop a user who names a file incorrectly. 

  • Disallowed characters include: \, /, :, *, ?, “, ‘, <, >, | 

Assuming you are making the jump to OneDrive, here are eight helpful tips to get the most from it:

1. Use OneDrive on a Mobile Device 

If you are using Microsoft OneDrive on a mobile device, there are a few things you should keep in mind to get the most out of it. First, make sure you have the latest version of the OneDrive app installed on your device – either from the Apple App Store or the Google Play Store. Second, if you are going to be accessing your files offline, make sure you have enough storage space on your device to accommodate them. And finally, remember that you can always access your OneDrive files from any web browser by going to onedrive.live.com.

2. Use OneDrive on a Mac or PC 

If you’re using a Mac or PC, you can access your OneDrive files by going to onedrive.live.com. Simply sign in with your Microsoft account and you’ll be able to view, download, or upload your files. You can also access your OneDrive files from the OneDrive app for Mac or PC, which you can download from either the Apple App Store or the Microsoft website.

3. Save Files to OneDrive 

To save a file to your Microsoft OneDrive, simply open the file in its respective application (Word, Excel, etc.), and then choose OneDrive as the location to save it. That’s it! Now you can access your file from any device with an internet connection by going to onedrive.live.com from your browser.

4. Upload Files 

Uploading files to Microsoft OneDrive is easy! Simply open the OneDrive app and click on the “Upload Files” button in the sidebar. From there, you can select the files you want to upload from your computer. Once the upload is complete, you’ll be able to access your files from any device with an internet connection by going to onedrive.live.com

5. Sync Files Across Devices 

If you are using Microsoft OneDrive, you can easily sync your files across multiple devices. To do this, simply sign into your OneDrive account on each device. Once you are signed in, your OneDrive files will automatically sync across all your devices.

6. Collaborate with Others 

Share Files 

Sharing files with others is a breeze with Microsoft OneDrive. Simply select the file or folder you wish to share, and then click the “Share” button. From there, you can enter the email addresses of the people you want to share with and decide whether they can view or edit the file. You can also add a message to include with the invitation. 

Share Folders 

If you’re collaborating with others on a project, Microsoft OneDrive is a great way to keep everyone on the same page. To do this, simply share your OneDrive file or folder with the people you’re working with. Once they have access to the folder, they’ll be able to view or edit them from any device with an internet connection.

7. Restore Older Versions of a File 

If you make accidental changes to a file or want to look at an older version of a file, this is a great feature of Microsoft OneDrive! You can easily go back to up to 10 prior versions of your file. To do this on a Mac or PC, simply right-click on the filename and choose “Browse Version History”. Once drive will provide you with a list of the dates and time of prior versions of the file. Select one and it will be opened in the appropriate application to view and save.

8. Access Your OneDrive Files Offline 

If you need to access your OneDrive files while you’re offline, there’s no need to worry! Microsoft OneDrive App on your device automatically makes a local copy of your files on your device, so you can always access them even if you don’t have an internet connection. To access your offline files, simply go to the OneDrive app and look for the “Available offline” section. 

Microsoft OneDrive is a great way to sync and share your files across multiple devices. It’s easy to use and has a variety of features that make it a valuable tool for both personal and professional use. We listed just a few of the potential benefits of using Microsoft OneDrive. If you have any questions about how to use OneDrive or would like help implementing it in your business, don’t hesitate to reach out to us at sales@montra.io. 

Seven Practices To Improve IT Asset Logistics

Do you know where all your company’s IT assets are? If not, you’re not alone – many businesses find it difficult to track down every phone, computer, or software license. IT asset tracking is an essential process for any organization looking to manage its technology resources efficiently. By establishing and following standardized procedures, your team can ensure that all devices and software are accounted for, and that important data is protected. In this blog post, we will outline some of the best practices in IT asset logistics so that you can create a system that works best for your organization. 

IT asset logistics is the process of tracking, monitoring, updating, and securing assets throughout their lifecycle. This includes locating and identifying assets, recording and tracking changes to asset data, and maintaining security and control over assets.  

The main goal of IT asset logistics is to ensure that organizations have a clear understanding of where all their assets are always. This helps to improve efficiency, reduce costs, and minimize the risk of lost or stolen assets.  

For an organization to implement an effective IT asset logistics solution, there are several key requirements that must be met: 

1. IT Asset Tracking Software: First and foremost, an organization needs appropriate IT asset tracking software. This software should be able to track every asset in the organization’s inventory, from laptops and smartphones to software licenses and cloud service subscriptions.

2. IT Asset Database: The IT asset tracking software should maintain a central database of all assets in the organization. This database should include detailed information about each asset, such as its make, model, serial number, and location. Not only does it provide a centralized repository for all data, but that data can also then be used to generate reports, conduct analysis, and track change over time. The asset database should be updated regularly to ensure that it is accurate and up to date. Additionally, the database should be accessible to authorized users only. This will help to ensure that sensitive information about assets is not compromised.

3. Device Tracking: The tracking software should be able to track the location of each physical device in real-time. This information can then be used to generate alerts if a device is moved without authorization, or if it goes missing. Additionally, the software should allow users to set up geo-fences so that they can be notified if a device enters or leaves a specified area. In some cases, it may also be necessary to attach tags to the IT device. These tags may use GPS or other technology to provide real-time locations for the IT devices, which can be useful for keeping track of high-value items or for monitoring device movements in real-time. Another common method is to use barcodes or RFID tags that can be affixed to devices and read using a handheld scanner. This data can be used to track the location of devices and keep inventory records up to date.

4. Reporting and Analytics: The reporting and analytics features of IT asset tracking software are key for understanding how assets are being used, where they are located, and other data points. These reports can be used to improve operational efficiency and optimize the utilization of assets. 

For example, a report on IT asset usage can help to identify which assets are being used most frequently and which ones are sitting idle. This information can then be used to make decisions about how to best allocate resources. Additionally, reports on asset location can help to ensure that assets are being used in the most efficient way possible. If an asset is constantly being moved from one location to another, it may be time to consider investing in additional units so that the asset can be used more efficiently.

5. Integration: Finally, IT asset logistics software should be able to integrate with other business systems. This includes ERP, CRM, accounting systems, monitoring and security systems, and shipping and procurement services. Integration allows organizations to automatically share data between different business processes and improve overall visibility into their operations. Integration is key when it comes to effective IT asset logistics. All too often, organizations silo their information, making it difficult to get a holistic view of their technology resources. By integrating your IT asset tracking system with other tools and processes, you can ensure that everyone is on the same page and that important data is not lost in the shuffle.

6. Automation: There are two ways to use automation to improve the accuracy and efficiency of IT asset logistics. The first is to automate the data collection process. This can be done in several ways, such as with barcodes or RFID tags, which are scanned by a handheld device. This data can then be used to track the location of devices and keep inventory records up to date. Secondly, you can use automated alerts to notify the appropriate personnel if a device is moved without authorization, goes missing so that your employees can take corrective action immediately.

7. Standardization: The last and most important aspects of IT asset logistics is to establish standardized procedures. This will ensure that all devices and software are accounted for, and that important data is protected. By following a set of standardized procedures, your team can improve communication and collaboration, and make sure that everyone is on the same page. Additionally, standardized procedures will help to ensure that your tracking system is able to scale as your organization grows. 

IT asset logistics is a critical process for any organization that relies on physical assets. By implementing an effective asset tracking solution, businesses can improve efficiency, reduce costs, and minimize the risk of lost or stolen assets. For more information on asset tracking, please contact us at sales@montra.io!