Columbia Advisory Group Expands Availability of its Services via TIPS-USA Contract

IT issues are mission-critical, and we are glad to be able to help our education, municipal, county and state agency clients to respond to increased IT needs and tightening budgets.

— David McLaughlin, President and CEO, Columbia Advisory Group Tweet

DALLAS, TEXAS, UNITED STATES, August 29, 2022/ — Columbia Advisory Group (CAG), the leading IT managed services and cybersecurity provider to public and private sector organizations, today announced the availability of its industry-leading services on The Interlocal Purchasing System (TIPS-USA).

The TIPS Program evolved to help streamline the procurement process and expedite purchases. As a co-op, both awarded technology vendors and public sector members – which include K-12 and private schools, colleges, universities, cities, counties, non-profits, and other government entities – can accelerate business transactions by requirements up-front.

Leveraging the TIPS-USA contract, higher-education and other government buyers can realize significant cost savings by reducing the overall time and expense of a cumbersome bid process. Because TIPS provides access to high-performance vendors, agencies can also achieve quick and efficient delivery of goods and services, particularly when it comes to cybersecurity and other IT services. In addition, TIPS provides access to state-of-the-art purchasing procedures to provide competitive contracts, bulk purchasing, and other efficiencies. For these reasons, TIPS has become a preferred purchasing vehicle for state and local entities.

The Interlocal Purchasing System currently serves entities such as state and local governments and non-profit organizations, including but not limited to K-12 school districts, Charter Schools, Colleges and Universities (State and Private), Cities/Municipalities, Counties/Parishes, State Agencies, Emergency Services Districts and Non-profit organizations as defined by the Internal Revenue Service, as well as many other entities with legislated purchasing/bidding requirements. TIPS-USA membership is free.

Now, with the addition of the CAG the TIPS-USA contract, members can realize digital transformation with a best-in-class IT services firm designed for public sector frameworks. CAG is trusted by multiple higher-education, government institutions, state agencies and school districts to manage their IT environments via cybersecurity services, digital optimization, and IT innovation.

“Our public sector clients appreciate the ability to secure our services via vetted contracts like that of TIPS-USA,” explains David McLaughlin, President and CEO of Columbia Advisory Group. “TIPS-USA will help our clients to move swiftly when they discover a need within their organization for our IT expertise. In today’s business age, IT issues are mission-critical, and we are glad to be able to help our education, municipal, county and state agency clients to respond to twin dynamics of increased IT needs and tightening budgets.”

For more than 10 years, CAG has helped leading public agencies to improve their cybersecurity postures and to improve their IT environment through managed service. CAG provides access to specialized practice teams, including cybersecurity, application support, IT governance, IT due diligence, project management, IT infrastructure and comprehensive audio-visual services.

To learn more about purchasing from CAG on the TIPS-USA contract, contact CAG.
About Columbia Advisory Group:
Columbia Advisory Group (CAG) is a leading Information Technology (IT) consulting firm. CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments, including many institutions of higher education, state agencies, and Fortune 50 customers. Practice specialty areas include Infrastructure, IT Service Management, Cybersecurity and A/V Services. CAG improves business outcomes with IT insights and expert technology support. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit

Dwight Moore Named Senior Vice President of Technical Services at Columbia Advisory Group

“We are pleased to have a leader of Mr. Moore’s caliber on our leadership team. I am confident that his integrity and experience will help us attract and grow our operational team to meet the needs of our existing and future clients.”

— David McLaughlin, President and CEO, Columbia Advisory Group Tweet

DALLAS, TEXAS, UNITED STATES, July 20, 2022/ — Dwight Moore is an Information Technology executive with more than three decades of experience with IT delivery and strategy. As Senior Vice President of Technical Services, Mr. Moore will assure that CAG service delivery teams are optimized to excel at serving customer needs. Mr. Moore will also assume operational planning to support CAG’s continued business growth, especially in the higher education sector.

Prior to Columbia Advisory Group, Mr. Moore spent 14 years at Accenture leading technical implementations and serving customer-facing roles with Fortune 500 clients, including leading a global web application technologies practice. Mr. Moore also previously worked as a leading consultant providing thought leadership and delivery experience in areas of AI and process automation. As a former CIO himself, Mr. Moore has experience balancing IT strategy and technology with budgetary and operational needs.

“We are pleased to have a leader of Mr. Moore’s caliber on our leadership team. I am confident that his integrity and experience will help us attract and grow our operational team to meet the needs of our existing and future clients,” said David McLaughlin, President and CEO of Columbia Advisory Group. “Our business growth trajectory demands that we continue to hire leaders who have the experience and vision to partner with clients to improve their business outcomes.”

Mr. Moore brings CAG a strong background in data centers, architecture, operations, application development, and project management. His experience spans industries including hospitality, retail, healthcare, insurance, telecom, and retail in addition to significant roles with two startup companies.

About Columbia Advisory Group:
Columbia Advisory Group (CAG) is a leading Information Technology (IT) consulting firm. CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments, including many institutions of higher education, state agencies, and Fortune 50 customers. Practice specialty areas include Infrastructure, IT Service Management, Cybersecurity and A/V Services. CAG improves business outcomes with IT insights and expert technology support. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit

Haley Rose
Columbia Advisory Group
+1 214-988-9950

Columbia Advisory Group Adds Extended Detection and Response to IT Managed Service Portfolio with Abacode Partnership

"In this time of increasing global attacks, it is critical to have around-the-clock eyes on the network.”

— David McLaughlin, President and CEO, Columbia Advisory Group Tweet

DALLAS, TEXAS, UNITED STATES, June 13, 2022 / — Dallas-based Columbia Advisory Group (CAG), a leading provider of IT Managed and Cybersecurity Services, today announced the expansion of its services via a partnership with Abacode, a leading provider of managed Extended Detection and Response (XDR).

The partnership between CAG and Abacode will allow clients to one-stop-shop for specialized IT Managed Services, Governance, Risk Management, and Compliance (GRC), Virtual CISO services and managed XDR services to analyze data breaches as they occur.

As organizations face increasing threats of ransomware, data breach, and phishing, they must simultaneously upgrade their governance and compliance activities to minimize risk while simultaneously detecting and responding to breaches as they arise to understand, contain and prevent them. This capability requires increasingly scarce competent cybersecurity leadership and specialized, virtual Security Operations Center (vSOC) services that can investigate problems in real-time and provide visibility across the enterprise of controls compliance.

“Our many public-sector, educational, manufacturing, and health care clients already rely upon CAG for cybersecurity guidance and IT expertise. CAG is pleased to bolster our leading Cybersecurity practice by offering 24x7x365 SOC 2 Type 1 and 2 XDR services via our partner, Abacode. In this time of increasing global attacks, it is critical to have around-the-clock eyes on the network,” said David McLaughlin, President and CEO of Columbia Advisory Group.

“Abacode is constantly striving to push the technology industry forward by partnering with top-notch leaders in the MSP space,” said Greg Chevalier, Senior Vice President – Partners and Sales Strategy for Abacode. “Partnering with Columbia Advisory Group ensures that clients not only have their information technology operations humming along at peak efficiency with their managed services but now includes Abacode’s Managed Detection and Response and Security Operations Center support.”

About Columbia Advisory Group:

Columbia Advisory Group (CAG) is a well-respected Information Technology (IT) consulting firm. CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments, including many institutions of higher education, state agencies, and Fortune 500 customers. By focusing on practical solutions and straightforward analysis, CAG’s team supports many regulatory and economic environments and organizations of all sizes. Practice specialty areas include Cybersecurity, Infrastructure, IT Service Management, Application Management and A/V Services. Whether a client is high-growth or economically challenged, CAG can improve business outcomes with IT insight and support. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit

About Abacode

Abacode combines leading technologies and professional services to implement Cybersecurity and Compliance programs for clients throughout the world. Abacode enables clients to implement a Cyber Capability Maturity Model and benefit from our expert Extended Detection and Response capabilities. Offices in the Americas and Europe. Learn more at or connect with us at

How The Growth of Esports Could Transform College Enrollment

Colleges around the country are always competing to attract students to their organizations and this requires constant adaptation to the needs of the marketplace and a willingness to change with the times.  With more competition than ever, its those colleges that can expand their marketing and enrolment strategies that will stay on the cutting-edge.  It’s difficult to do this, of course, because of the status quo bias that we all carry with us – but it’s a crucial skill for 2022 and beyond.

One good example of where this is coming into play is in how colleges treat new, emerging trends like the growth of esports.  It feels like we’re at an inflection point right as the industry continues to expand – and it feels like the right time to tackle just what this means for the future of higher education.  We believe that it represents a tremendous opportunity to grab onto some new potential – but we’ll let you be the judge of it.

Let’s dive in.

What are Esports and Why Do They Matter?

Esports refers to organized competitions where people compete in video game format.  Any video game can fall into this category and what sets it apart from a mere hobby is the vast industry that has developed around it.  In a very short space of time, we’ve gotten to a place where large audiences are wanting to watch these competitions, funders who want to back it, and professional players who see this as a viable long-term career for the very first time.

To give you a sense of the scale here, some competitions can fill football stadiums with in-person fans, while still collecting thousands of people watching live online.  It’s kind of surreal to think about the fact that video game competitions are garnering such interest – but that’s where the world is moving.  Thanks to advancements in networking technology, the rapid growth of online streaming, and a societal change to the status of these games, this is now a very serious thing that all colleges should have their eyes on.

We rarely see such a distinct shift in something like this, and so it’s certainly worth paying attention to.

How Should Colleges Think About Esports?

There are some compelling reasons why colleges should be taking this trend seriously and adapting their strategies accordingly.  Here are some of the ones that stand out:

  • New Sporting Code.  For many colleges, the sporting component of the university is incredibly important.  It plays a major role in terms of raising funds, creating a strong brand, providing a well-rounded student experience, and developing an ecosystem of excellence that goes beyond the academics themselves.  

It’s in this vein that esports should be seriously considered as a new sporting code.  It’s inevitable that this world will continue to grow and colleges would do well to set themselves apart by recognizing this early and leaning into the potential here.  By attracting some of the top esports players that are coming out of schools, you give yourself a chance to optimize your admissions for the future – capturing talent that was previously not fully appreciated and creating a student body that represents the full spectrum of the modern world.  It also will help to create a strong sporting environment that can bear fruit in the future.

  • Transferable Skills.  Leaning into esports is also a counter-intuitive way of investing in skills that are very valuable in our modern era.  The very nature of esports is that it engrosses students in technology in a way that can be much more immersive and entertaining than some other means.  We’re always looking for ways to incentivize more engagement with STEM-related subjects and this is a great way to do this.  

Whether it’s the playing of the games itself, or the work that comes with setting up and managing the competitions, there is space for an entirely new collective to grow around these esports that can provide students with a new way to engage, learn, and advance as people.

  • Critical Thinking.  It might not seem so at first glance, but esports actually provides the perfect environment for the development of critical thinking skills.  In any game that you play, there are a range of cognitive and procedural things that you must learn in order to overcome obstacles and achieve the end objectives of the game.  The feedback loops on this learning are immediate and because the rewards are gamified, students don’t even see it as learning.  It becomes a trojan horse that trains concentration, strategic thinking, teamwork, and problem-solving in a way that just can’t be replicated via textbook or lecture.  

As we do more scientific studies into this phenomenon we’ll understand it better, but what is for sure is that these esports are so much more than just about the game.  They are a virtual microcosm for young people to explore new concepts and stretch themselves in service of their cognitive development.

Those are just three of the major points of consideration that should be front of mind for colleges the world over.  By taking these seriously and preparing for what is to come, you put yourself ahead of the game.

Where To From Here?

It’s clear that this trend isn’t turning around and while some dismiss it, others see the opportunity for something special here.  It can help with college enrollment, open up new pathways, and create spaces for new sorts of student engagement that might just transform the way that you think about your admissions process.

Those colleges who get ahead of the curve and start readying themselves for this future are going to have a significant advantage over those who ignore the signs.  Esports are here to stay and they are going to play a major role at the intersection of sport and technology going forward.  It’s time that we remove the stigma from this industry and embrace the rapid growth and widespread benefits that such sports can provide.

Civil Cyber-Fraud Initiative by the US Department Of Justice (DoJ): Everything You Need to Know!

The US Department of Justice (DoJ) has officially launched its new Civil Cyber-Fraud initiative. It enacted the legislation to strengthen cybersecurity standards among contractors undertaking government projects and receiving federal funds and other grant recipients such as universities. Such organizations and beneficiaries need to address cybersecurity risks and report breaches to comply with the latest legislation and regulatory guidelines

The new Cyber Fraud Initiative from the US Department of Justice brings together the department’s expertise in civil fraud enforcement, government contracting, and cybersecurity to counteract existing and growing cybersecurity risks to confidential material and safety infrastructure. The Department of Justice is working to improve the resilience of the country and its critical information infrastructure (CII) against increasingly sophisticated cybersecurity threats via new reforms was much needed to ensure the protection of trade secrets, Intellectual Property (IP), proprietary knowledge, trademarks, and copyrights, protecting the privacy of all stakeholders involved, and preventing sensitive and confidential information from falling into the hands of threat actors. This will ensure that taxpayers’ money is used diligently and will also help build public trust in the system in safeguarding their valuable information assets.

Cyber Fraud: Some Key Statistics

According to AtlasVPN, the damages to organizations by cybercrimes from 2019 to the current time have increased by 37.4% with each passing year. Further, the rate of cybercrimes will increase by over 40%.


Some of the vital cybercrime statistics in the US and around the globe shows how threatening and challenging cybercrime has become:

  • FBI’s IC3 reported complaints in 2020 contained over 241,342 phishing, 76,741 extortion, and over 45,000 personal data cyber breaches.
  • Malicious actors attack 1/5th of educational institutions and universities, with 65% of data breaches targeting higher-education centers.
  • 2022 will be the year for misinformation campaigns surrounding cybercrimes, which will become the new attack vector.
  • Cybercrimes are ever-increasing and are estimated to cost $10.5 trillion per annum to businesses by 2025.

The New Civil Cyber-Fraud Initiative By The US DoJ

The new Civil Cyber-Fraud Initiative will use the False Claims Act to investigate cybersecurity-related misconduct by government contractors and those receiving federal grants and funds. The Act also incorporates the “whistleblower” clause that permits individuals who volunteer evidence pertinent to an inquiry to benefit from any assets seized. The Department of Justice will utilize the FCA (False Claims Act) to hold primary liability for failure to satisfy cybersecurity criteria, including prosecutions for:

  • Offerings and services that aren’t up to par in terms of cybersecurity within the organization or for knowingly providing deficient cybersecurity products or services.
  • Cybersecurity-related information, cybersecurity protocols, and processes that are misrepresented or falsified.
  • Negligence by management or the organization in managing, tracking, and notifying cybersecurity incidents and data breaches.

While the DOJ’s approach is novel, the use of the False Claims Act to compel cybersecurity adherence is not. Still, due to the current Civil Cyber-Fraud Initiative, it has become more crucial than ever for institutions to be ready to deal with constitutional issues relevant to cyber intrusions. On a high level, the Civil Cyber-Fraud Initiative:

  • Holds the government contractors and grantees to their commitments to protect government information and infrastructure.
  • Ensures that government contractors recognize and develop strategies to comply with contract terms, statutes, and federal requirements.
  • Provides an opportunity for reimbursement of taxpayers’ and governments’ money if there is a compromise at the organization’s end.
  • Drives organizations receiving government grants and funds also work to build a strong cybersecurity posture.

Industries to be Impacted by The New Civil Cyber-Fraud Initiative

The Department of Justice’s Civil Cyber-Fraud Initiative may impact almost all private, public, or government organizations receiving government funds or grants, but let’s look at its impact on some of the critical sectors in detail:

  • Health Care and Life Sciences: The Cyber Fraud Initiative would target federal employees and federally funded beneficiaries. Therefore, medical and life sciences organizations that partner with or receive support from the legislative branch may be susceptible to FCA inspection.
  • Educational Institutions: Failure to comply with the Cyber-Fraud Initiative may have far-reaching ramifications for universities and higher education institutions receiving government funds and grants but who lack adequate cybersecurity safeguards. In consideration of federal requirements, every university or college that retains critical or privileged information must carefully evaluate the forms and the efficacy of its security controls and procedures.
  • Banking and Financial Industry: Banking and financial organizations are a significant target for malicious actors because of the scale and sensitivity of data that they store. Following the Cyber Fraud Initiative, all monetary regulators will need sufficient documentation and reporting structures, cybersecurity policies, and incident response strategies since any violation of rules would hold them accountable and liable.
  • Defense Industry: The initiative brings in the DOJ’s expertise and experience in various government procurement and civil fraud enforcement to combat emerging cybersecurity threats and risks. This helps protect confidential and sensitive information and critical information systems. For instance, if a defense contractor misuses trade secrets stored digitally in the form of government intellectual property n, the contractor could become liable, especially if the contractor fails to report the breach.

Risks of Non-Compliance

Non-Compliance with the new Civil Cyber Fraud Initiative opens organizations and individuals to various risks, such as:

  • Increased Liability Risks: The Department of Justice announced that it intends to hold organizations and individuals liable for various actions, including intentionally offering inadequate cybersecurity services, deliberately mischaracterizing their cybersecurity practices or procedures, and knowingly failing to report data breaches and infringements. Contractors may be held liable for failure to cooperate with cyber breach reporting terms in government contracts within the Cyber Fraud Initiative.
  • Penalties on Enterprises and Individuals: NIST 800-171 applies to any organization or agency that deals with Controlled Unclassified Information (CUI). Those who do not adhere to statutory cybersecurity requirements could be prosecuted using the FCA clause in the Cyber Fraud Initiative and face a penalty. Furthermore, besides enterprises, DoJ can hold civilians legally responsible for cybersecurity-related fraud.
  • Increased Litigation Risks: The Department of Justice notably emphasizes relying on whistleblowers to help the government restore order in its announcement. After determining their cybersecurity basis, organizations should consider implementing an internal review with counsel to compare their declarations to the federal government. The FCA cyber-risk exposes the organization to litigation if any disparities with the legal framework are identified.

Recommendations: Here is What Organizations Can Do!

Organizations can protect themselves better and ensure compliance with the Department of Justice’s new law with the help of:

  • Internal Audits and Assessments: Organizations should continue to identify their key information assets and evaluate their readiness for a cyber breach, and internal audits and assessments play a critical role in it. Based on the internal assessment, organizations can prioritize actions and processes to protect their information assets before, during, and after a security incident or data breach.
  • Continuous Monitoring and Reviews: Organizations must implement changes to continuously monitor changes within the technology environment, vulnerability management, and activities to anticipate various infringements with federal regulatory frameworks, processes, and policies. They may use whistleblowers to help with the process.
  • Documentation: Clearly written standards, plans, and policies are essential for ensuring the organization’s compliance with the cybersecurity requirements as per the government. Robust documentation will also help resolve internal issues and potential leaks eliminating questions regarding the standard operating procedures (SOPs) to be followed to effectively identify and address a security incident.
  • Internal Discussions: The Management should ensure that all policy conformity discussions with the government are correctly recorded and readily available. They must also collaborate with individuals who identify issues to analyze risk exposures.

Final Words

The Department of Justice’s Cyber Fraud Initiative seeking compliance with the False Claims Act is the government’s official legal remedy for for cybersecurity negligence and fraud. The strategy raises the bar for adherence initiatives for federal contractors or federal grant beneficiaries, such as universities. The latter are far more at risk concerning adopting essential cybersecurity precautions and deciding whether or not to disclose a violation because of the False Claims Act.

Expect increased FCA litigation against organizations that fail to mitigate the risk of cyber breaches. Attentive cybersecurity compliance procedures will ensure protect sensitive data an minimize the risk of significant fines under the FCA.


  1. Krotoski, M., Baruch, D., & Fan, S. (2021, December 08). Are you prepared for DOJ’s Civil Cyber-Fraud Initiative? Morgan Lewis.
  2. Department of Justice. (2021, October 6). Deputy Attorney General Lisa O. Monaco announces new Civil Cyber-Fraud Initiative.
  3. Gersh, D., Moundas, C., O’Connor, A., Darch, J. & Hardy, G. (2021, November 24). DOJ Civil Cyber-Fraud Initiative may impact health care and life sciences companies. Mondaq.
  4. Shaheen, M., Bartle, S., & Trujillo, G. (2022, January 19). Cybersecurity compliance requirements may surprise higher ed. University Business.
  5. Ross, R., Pillitteri, V., Dempsey, K., Riddle, M., & Guissanie, G. (2020). Protecting controlled unclassified information in nonfederal systems and organizations. Gaithersburg, MD: National Institute of Standards and Technology.
  6. The false claims act. (2019, June 17). Retrieved February 20, 2022, from website:

Log4J: Neutralizing the latest global cybersecurity threat


Every day we see news about cybersecurity attacks, exploits, and hacks to the point that we are relatively immune to what feels like sensationalized news about the latest and most devastating threat no matter how legitimately concerned we should be.
And on December 6th when we were getting ready to go to the office holiday party and a weekend of shopping, the world was read-in on a significant security vulnerability known as LogJ4.

What is Log4J?

Log4J is a widely used open-source Java code library from the Apache Software Foundation used by many servers across the world to record a log of activity and send it to a centralized server. It is integrated into thousands of software applications, services, and systems, and websites from Fortune 100 firms down to small providers.

What is the new vulnerability?

It was discovered that some common versions of Log4J are vulnerable to being forced to execute code via specially crafted URLs (web address) that pass through the logs. This address passes through the system and is used to download and execute code that can provide remote access to the machine or perform other malicious tasks. Having information pass through the logs can be done from a chat, submitting an online form, sending an email that is processed by a system that uses Log4J to log emails, or any other means in which data enters the logs, effectively allowing someone with nefarious intentions to see sensitive user data, install malware and spyware, or even take over machines for nefarious purposes.

How widespread is this?

As noted on, Twitter users have experimented with changing their display names to trigger the vulnerability, users in the game Minecraft triggered it through the in-game chat, and an iPhone user changed their device name to trigger the vulnerability (and did notify Apple). Cloud service providers, such as Cloudflare, rolled up temporary fixes for their customers while heavily used systems from companies such as VMWare, Oracle, Adobe, RedHat, and others have worked to update to the latest release of Log4j released by Apache that addresses the remote code execution vulnerability and downgrading the risk to moderate.

What do I need to do?

Your institution’s IT departments and security teams should be assessing their catalog of systems and software that use Apache with Java libraries to determine which systems may be vulnerable. Initial focus should be on public-facing systems, most likely to be ERP and SIS systems used by the institution. They should also be working with those vendors on obtaining patches and scheduling updates to the systems as soon as practical.

In addition, it is important to make sure that faculty, staff and students are aware of the exploit and how it can impact their personal BYOD (Bring Your Own Device) devices such as iPhones and share best practices such as using 2-Factor Authentication and keeping their devices up to date with the latest security patches.

If your IT department and security teams are unsure of a system’s potential vulnerability, they should check with the vendor to validate those systems have the latest security patches. If your institution does not have a security team, check with your managed security services provider. If you do not have a managed security service provider, reach out to Columbia Advisory Group as part of E&I contract CNR01469 to engage our team of experts to ensure your institution adheres to appropriate NIST standards and can manage, detect and respond to Log4j and other threats.


The Log4J vulnerability has been patched by Apache with the introduction of Log4j 2.17.1, yet the threat is being actively exploited across the globe and still poses one of the largest security threats to date. The National Institute of Standards and Technology (NIST) that maintains a database of vulnerabilities has listed this at its highest severity classification. Due to the widespread use of the open-source Log4J application by vendors from small software applications to large enterprise systems and cloud services, there is a high-likelihood most organizations will have some risk to mitigate.

While the risk associated with Log4J has concrete solutions, the next cyber exploit will present a danger to your university’s operations.

Columbia Advisory Group Launches Enhanced Services and Adds Key Resource Hires to Support Accelerated Growth

Columbia Advisory Group (CAG), a well-respected Information Technology (IT) consulting firm, has expanded to better support client needs with employees in Houston, Texas and Atlanta, Georgia. The employees are collocated with clients for on-site support and consulting.

“The geographical expansion, along with new hires in those locations, has enabled Columbia Advisory Group to grow our resources and offer additional services and support, which better meet the needs of our clients,” said David McLaughlin, President and CEO of Columbia Advisory Group. “Our recent new hires bolster our security and infrastructure practices, as well as our technology architecture practice. We have seen significant growth and sophistication in these areas and continue to stay on the leading edge of the industry.”

CAG works with its clients to create and provide detailed IT analysis and solutions. CAG’s IT due diligence services provide EBITDA visibility, identify and mitigate IT risks, and minimize investment thesis execution risk. The company is known for working with difficult and demanding IT problems in a variety of economic, regulatory and budgetary environments. The industries representative of their clients include private equity and venture capital, higher education, non-profit, manufacturing, financial services, real estate, healthcare and pharmacy, as well as media and publishing.

About Columbia Advisory Group:
Columbia Advisory Group (CAG) is a well-respected Information Technology (IT) consulting firm. An established and proven company with 100+ years of combined technology experience and business acumen, CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments. By focusing on simple, meaningful and practical solutions combined with straight-forward analysis and recommendations, CAG’s team has experience in many regulatory and economic environments with companies and organizations of all sizes. CAG not only offers a deep understanding of IT, but its solutions are software and hardware agnostic. Whether a client is high growth or economically challenged, CAG can adapt to the complexities and nuances of that business. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit The company can be found and followed on Facebook, LinkedIn and Twitter.