As a small business, you may have qualified to receive a piece of the Paycheck Protection Program (PPP) funds that were allocated by the Small Business Administration (SBA) in response to the economic disruption caused by the coronavirus (COVID-19) outbreak. In addition to bolstering cash flow, SBA’s PPP will also forgive loans if all employees are kept on payroll for eight weeks and the funding is utilized specifically for payroll, rent, mortgage interest or utilities.
Life science and health care is the industry which is a late adopter of digital innovation but never left untouched by this. For life sciences companies who are looking to transform digital technology, here are the latest tech trends they should focus on.
“Let the Data Talk”
Nick Vass, J29 Inc.
As companies continue to navigate through unchartered territories in remote work environments, it’s important for some of our teams to stay true to the countless acts that led our success to where it is. While the way we do business has been changed in the moment, the question of how we came to that decision-making process will stay true – by letting data have a seat at the table.
A Fit Agile Framework
By Millie Paniccia
I’ve dedicated the last 18 years of my professional life to working in commercial software product development environments—from employee to executive. As the current Managing Partner of an advisory services firm, I have seen just about all there is to see in business, working with startups whose employees range from three to large organizations that have tens of thousands. Nowadays , I spend most of my time helping organizations with product delivery issues improve, scale or prepare for IPO.
Best Practices for Fortifying Your Organization Against Cybercriminals
The connectivity of today’s employees has left executives unable to overlook the cybersecurity of their organization any longer. It’s no longer a question of if your business will be targeted by cybercriminals, it’s now a matter of if your cybersecurity precautions will fail you. Cybercriminals have reached a new level of sophistication – they can attack your infrastructure at all times of day, using automated algorithms, making it nearly impossible to keep them out all of the time. Staying current with your technology and processes is the only way to protect your business from harm.
Today, almost all businesses are affected by compliance. Whether you’re in the healthcare industry and are bound by HIPAA regulations, or you’re a manufacturer attempting to meet NIST standards before you lose your government contract, your business cannot afford to be in the dark about compliance regulations.
If you’re a manufacturer within 50 miles of Washington D.C., your organization is probably working with the United States government in some way, shape or form. Whether you have a contract directly with the government or you provide products or materials to someone who does, your company is now responsible for ensuring that you are compliant with NIST 800-171 standards.
The Maryland Tech Council is partnering with the Maryland Association of Counties (MACo) to co-host an exclusive deep-dive focusing on Maryland tech, biotech and cyber vendors. These sessions with feature over 50 tech exhibits and three intensive technology sessions, complete with demonstrations of the latest technology for county governments. Exhibitors will present everything from GIS to 3-D printing, body cameras, virtual reality and more, featuring cutting-edge technology that is revolutionizing sectors across Maryland.
Specter and Meltdown, names given to a recently discovered vulnerability that affects almost every computer chip manufactured in the last 20 years. If exploited, attackers could gain access to data previously considered completely protected. The Specter and Meltdown flaws work by exploiting two important techniques used to make CPU chips execute faster, called speculative execution and caching.
We are a connected, digital society that depends heavily on networks, databases and other digital systems to operate. Almost every aspect of our lives, from the most basic tasks at the workplace to our personal communication and social interactions, to the way we shop and the tools we use to study and learn, depends on some form of electronic interaction or data exchange. These digital environments are practical, useful and fast, but in our excitement to use, leverage and widely deploy them, we have forgotten to secure them.