Columbia Advisory Group Achieves ISO 9001:2015 Certification for the 7th Straight Year.

Dallas, TX – October 17, 2024 – Columbia Advisory Group (CAG), a leading provider of IT consulting, cybersecurity, and compliance services, is proud to announce that it has achieved the prestigious ISO 9001:2015 certification for its Quality Management System (QMS) by DEKRA Certification, Inc. for the seventh consecutive year.

ISO 9001:2015 is an internationally recognized standard that ensures organizations meet the needs of customers through an effective quality management system. This certification demonstrates CAG’s ongoing commitment to delivering consistent, high-quality services and improving operational performance.
“Achieving ISO 9001:2015 certification for seven consecutive years reflects our unwavering dedication to quality and excellence,” said David McLaughlin, CEO of Columbia Advisory Group. “This certification from DEKRA underscores our commitment to continuous improvement and customer satisfaction while reinforcing our position as a trusted partner in cybersecurity, IT services, and compliance.”
CAG’s Quality Management System includes processes that focus on delivering services that meet client needs, improving customer satisfaction, and maintaining high standards across its operations. The certification process involved a thorough audit of CAG’s procedures, ensuring alignment with ISO 9001:2015 criteria.
This achievement strengthens CAG’s standing as a trusted and reliable provider in IT consulting, cybersecurity, and compliance services across various industries, including education, healthcare, finance, and government sectors.

About Columbia Advisory Group

Columbia Advisory Group (CAG) provides expert IT consulting, cybersecurity, and compliance services to a diverse range of industries. The company’s comprehensive solutions help organizations manage their IT infrastructure, safeguard sensitive data, and ensure compliance with regulatory requirements. CAG’s client-centric approach and commitment to quality have positioned it as a leader in the IT services industry.

About DEKRA Certification, Inc.

DEKRA Certification, Inc. is one of the world’s leading providers of auditing and certification services, helping organizations achieve internationally recognized certifications in quality management, environmental management, health and safety, and more. With a global presence, DEKRA is committed to ensuring organizations meet the highest standards of performance and quality.

Media Contact:

Haley Rose
Chief Marketing Officer
Columbia Advisory Group
Phone: 512-657-0294
Email: hrose@columbiaadvisory.com
For more information about Columbia Advisory Group and its services, visit www.columbiaadvisory.com.

Columbia Advisory Group Selected as E&I Cooperative Partner for Cyber Security and Compliance

Dallas, TX – September 23, 2024 – Columbia Advisory Group (CAG), a leading provider of IT consulting and cybersecurity services, is proud to announce its selection as the preferred Cyber Security and Compliance partner for the E&I Cooperative Services, the largest member-owned, non-profit purchasing cooperative serving the needs of education.

The partnership enables CAG to deliver comprehensive cybersecurity and compliance solutions to E&I’s vast network of over 5,000 educational institutions. These services include risk assessments, compliance management, data protection, network security, and more, providing a robust and proactive approach to safeguarding educational data and infrastructure.
“We are honored to be chosen by E&I Cooperative Services as their trusted partner in cybersecurity and compliance,” said David McLaughlin, CEO of Columbia Advisory Group. “This collaboration allows us to extend our expertise to a wider range of educational institutions, ensuring that they have access to the highest level of protection against the ever-evolving landscape of cyber threats.”
E&I Cooperative Services’ selection of CAG highlights the growing demand for advanced cybersecurity measures within the education sector. As cyber threats become increasingly sophisticated, institutions face challenges in protecting sensitive data and maintaining compliance with regulatory standards. CAG’s solutions are designed to address these challenges effectively, offering scalable and customizable services to meet the unique needs of each institution.

About Columbia Advisory Group

Columbia Advisory Group (CAG) is a leading provider of IT consulting, cybersecurity, and compliance services. With a team of experienced professionals, CAG helps organizations manage technology, protect data, and ensure regulatory compliance. The company serves a diverse range of industries, including education, healthcare, finance, and government.

About E&I Cooperative Services

E&I Cooperative Services is the only member-owned, non-profit purchasing cooperative focused exclusively on serving the needs of the education community. With a mission to deliver cost-saving solutions, E&I connects educational institutions with top-quality products and services, enhancing operational efficiency across the board.

Media Contact:

Haley Rose
CMO
Columbia Advisory Group
hrose@columbiaadvisory.com
For more information about Columbia Advisory Group and its services, visit www.columbiaadvisory.com.

Columbia Advisory Group Selected to Continue Providing Texas A&M University System Best-in-Class Technology Services

"We selected CAG for this Agreement because of our previous experience with the company. They are fully committed to TAMUS success. We can always count on them to respond quickly when we need them."

DALLAS, TEXAS, UNITED STATES, April 18, 2023/EINPresswire.com/ — Columbia Advisory Group (CAG) has been selected by Texas A&M University System (TAMUS) to significantly lower the operating cost of delivering Student Information Services while providing enhanced support of audit and compliance functions.

“We selected CAG for this Agreement because of our previous experience with the company and its consultants. They are fully committed to TAMUS success. We can always count on them to respond quickly when we need them, do an outstanding job with some of the toughest issues, and help keep costs under control,” said Mark Stone, Chief Information Officer, Texas A&M University System. “We look forward to continuing to work with CAG across many technology challenges.”

“Our substantial experience with student information and related systems at several TAMUS campuses and many other higher education clients, and our ability to operate systems across many platforms efficiently and securely, has helped us again win the opportunity to provide these and other expanded services to all members,” said David McLaughlin, President and CEO of CAG. “Our team excels technically but also cares about the outcomes for our clients and students. Our trusted consultants have led us to become the first call to address key issues that arise.”

CAG will continue to provide Ellucian Banner support to Texas A&M University System and its members under this agreement, helping to integrate, update, patch, and maintain this critical business system. As Banner and other systems migrate to cloud environments, CAG can provide support to advise and manage those migrations. In addition, TAMUS has selected CAG to provide ancillary IT support for cybersecurity, infrastructure, application support, and IT project management as needs arise across the state.

About Columbia Advisory Group
Columbia Advisory Group (CAG) is a dynamic Information Technology (IT) consulting firm. An established and proven company with 100+ years of combined technology experience and business acumen, CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments. By focusing on simple, meaningful, and practical solutions combined with straight­ forward analysis and recommendations, CAG’s team has experience in many regulatory and economic environments with companies and organizations of all sizes. The industries representative of their clients includes higher education, healthcare and pharmacy, private equity and venture capital, manufacturing, financial services, real estate, media and publishing. CAG offers a deep understanding of IT, and its solutions are software and hardware agnostic. Whether a client is a high growth or economically challenged, CAG can adapt to the complexities and nuances of that organization. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit www.columbiaadvisory.com.

About The Texas A&M University System
The Texas A&M University System is one of the largest systems of higher education in the nation, with a budget of $7.2 billion. Through a statewide network of 11 universities, a comprehensive health science center, eight state agencies, and the RELLIS Campus, the Texas A&M System educates more than 152,000 students and makes more than 24 million additional educational contacts through service and outreach programs each year. System-wide, research and development expenditures exceed $1 billion and help drive the state’s economy.

Haley Rose, CMO
Columbia Advisory Group
hrose@columbiaadvisory.com

Columbia Advisory Group Expands Availability of its Services via TIPS-USA Contract

IT issues are mission-critical, and we are glad to be able to help our education, municipal, county and state agency clients to respond to increased IT needs and tightening budgets.

DALLAS, TEXAS, UNITED STATES, August 29, 2022/EINPresswire.com/ — Columbia Advisory Group (CAG), the leading IT managed services and cybersecurity provider to public and private sector organizations, today announced the availability of its industry-leading services on The Interlocal Purchasing System (TIPS-USA).

The TIPS Program evolved to help streamline the procurement process and expedite purchases. As a co-op, both awarded technology vendors and public sector members – which include K-12 and private schools, colleges, universities, cities, counties, non-profits, and other government entities – can accelerate business transactions by requirements up-front.

Leveraging the TIPS-USA contract, higher-education and other government buyers can realize significant cost savings by reducing the overall time and expense of a cumbersome bid process. Because TIPS provides access to high-performance vendors, agencies can also achieve quick and efficient delivery of goods and services, particularly when it comes to cybersecurity and other IT services. In addition, TIPS provides access to state-of-the-art purchasing procedures to provide competitive contracts, bulk purchasing, and other efficiencies. For these reasons, TIPS has become a preferred purchasing vehicle for state and local entities.

The Interlocal Purchasing System currently serves entities such as state and local governments and non-profit organizations, including but not limited to K-12 school districts, Charter Schools, Colleges and Universities (State and Private), Cities/Municipalities, Counties/Parishes, State Agencies, Emergency Services Districts and Non-profit organizations as defined by the Internal Revenue Service, as well as many other entities with legislated purchasing/bidding requirements. TIPS-USA membership is free.

Now, with the addition of the CAG the TIPS-USA contract, members can realize digital transformation with a best-in-class IT services firm designed for public sector frameworks. CAG is trusted by multiple higher-education, government institutions, state agencies and school districts to manage their IT environments via cybersecurity services, digital optimization, and IT innovation.

“Our public sector clients appreciate the ability to secure our services via vetted contracts like that of TIPS-USA,” explains David McLaughlin, President and CEO of Columbia Advisory Group. “TIPS-USA will help our clients to move swiftly when they discover a need within their organization for our IT expertise. In today’s business age, IT issues are mission-critical, and we are glad to be able to help our education, municipal, county and state agency clients to respond to twin dynamics of increased IT needs and tightening budgets.”

For more than 10 years, CAG has helped leading public agencies to improve their cybersecurity postures and to improve their IT environment through managed service. CAG provides access to specialized practice teams, including cybersecurity, application support, IT governance, IT due diligence, project management, IT infrastructure and comprehensive audio-visual services.

To learn more about purchasing from CAG on the TIPS-USA contract, contact CAG.
About Columbia Advisory Group:
Columbia Advisory Group (CAG) is a leading Information Technology (IT) consulting firm. CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments, including many institutions of higher education, state agencies, and Fortune 50 customers. Practice specialty areas include Infrastructure, IT Service Management, Cybersecurity and A/V Services. CAG improves business outcomes with IT insights and expert technology support. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit www.columbiaadvisory.com.

Columbia Advisory Group Adds Extended Detection and Response to IT Managed Service Portfolio with Abacode Partnership

"In this time of increasing global attacks, it is critical to have around-the-clock eyes on the network.”

DALLAS, TEXAS, UNITED STATES, June 13, 2022 /EINPresswire.com/ — Dallas-based Columbia Advisory Group (CAG), a leading provider of IT Managed and Cybersecurity Services, today announced the expansion of its services via a partnership with Abacode, a leading provider of managed Extended Detection and Response (XDR).

The partnership between CAG and Abacode will allow clients to one-stop-shop for specialized IT Managed Services, Governance, Risk Management, and Compliance (GRC), Virtual CISO services and managed XDR services to analyze data breaches as they occur.

As organizations face increasing threats of ransomware, data breach, and phishing, they must simultaneously upgrade their governance and compliance activities to minimize risk while simultaneously detecting and responding to breaches as they arise to understand, contain and prevent them. This capability requires increasingly scarce competent cybersecurity leadership and specialized, virtual Security Operations Center (vSOC) services that can investigate problems in real-time and provide visibility across the enterprise of controls compliance.

“Our many public-sector, educational, manufacturing, and health care clients already rely upon CAG for cybersecurity guidance and IT expertise. CAG is pleased to bolster our leading Cybersecurity practice by offering 24x7x365 SOC 2 Type 1 and 2 XDR services via our partner, Abacode. In this time of increasing global attacks, it is critical to have around-the-clock eyes on the network,” said David McLaughlin, President and CEO of Columbia Advisory Group.

“Abacode is constantly striving to push the technology industry forward by partnering with top-notch leaders in the MSP space,” said Greg Chevalier, Senior Vice President – Partners and Sales Strategy for Abacode. “Partnering with Columbia Advisory Group ensures that clients not only have their information technology operations humming along at peak efficiency with their managed services but now includes Abacode’s Managed Detection and Response and Security Operations Center support.”

About Columbia Advisory Group:

Columbia Advisory Group (CAG) is a well-respected Information Technology (IT) consulting firm. CAG’s team has assessed and helped improve the performance of more than 300 technology organizations and IT departments, including many institutions of higher education, state agencies, and Fortune 500 customers. By focusing on practical solutions and straightforward analysis, CAG’s team supports many regulatory and economic environments and organizations of all sizes. Practice specialty areas include Cybersecurity, Infrastructure, IT Service Management, Application Management and A/V Services. Whether a client is high-growth or economically challenged, CAG can improve business outcomes with IT insight and support. Based in Dallas, Texas, CAG works extensively with clients throughout the U.S. For more information, visit www.columbiaadvisory.com.

About Abacode

Abacode combines leading technologies and professional services to implement Cybersecurity and Compliance programs for clients throughout the world. Abacode enables clients to implement a Cyber Capability Maturity Model and benefit from our expert Extended Detection and Response capabilities. Offices in the Americas and Europe. Learn more at Abacode.com or connect with us at insight@abacode.com

Ransomware Incident Response Planning

Ransomware attacks are ever-increasing globally. Here’s how to evaluate your cyber security partners and be resilient, when preparing for the worst.

Colonial Pipeline, Kaseya, Solar Winds, Microsoft… the list goes on and on. In the past 12 months alone, more than one third of all organizations globally have faced some type of ransomware incident, according to a recent survey by research firm IDC.

The ransomware industry has evolved in sophistication. Malicious actors even subscribe to Ransomware as a Service (RaaS), whereby criminal organizations lease ransomware variants the same way that legitimate software developers lease SaaS products. RaaS gives everyone, even people without much technical knowledge, the ability to launch ransomware attacks just by signing up for a service.

RaaS kits allow malicious actors, lacking these skills or time, to easily develop their own ransomware variants that can be up and running quickly and affordably. Such RaaS kits are easy to find on the dark web. A RaaS kit may include 24/7 support, bundled offers, user reviews, forums, and other features identical to those offered by legitimate SaaS providers. The price of RaaS kits ranges from $40 per month to several thousand dollars – trivial amounts, considering that the average ransom demand in Q3 2020 was $234,000.

A threat actor doesn’t need every attack to be successful in order to become rich. RaaS is big business, with total ransomware revenues in 2020 of around $20 billion—up from $11.5 billion in 2019.

Clearly, ransomware incidents are not going away any time soon. In fact, they are accelerating. It is vital to create a digitally resilient institution that can absorb the impact yet not be crippled by the attack, in order to recover quickly without significantly impacting students, faculty, and research. Digital resilience represents the ability to continue to operate through an impairment and stay in business while minimizing institutional harm, reputational damage, and financial loss.

Resilient organizations:

  • know their networks and data
  • set targets, measurements, and goals for cybersecurity
  • employ best practices in change management
  • prioritize risks and intelligence for better decision-making
  • respond rapidly to incidents while maintaining operational readiness, reducing the risk of data loss, and preventing additional harm

Given this “new normal,” what attributes should you consider when selecting a partner to help you minimize your risk and create a ransomware playbook to maintain resilience?

Not all cybersecurity services are created equal. Consider this checklist as one way to evaluate cybersecurity partners:

1. As the old adage says, “You cannot determine where you are going until you know where you are.”

Select a partner that is able to baseline and assess your current information security program. Typically, reputable cybersecurity services begin with a detailed policy assessment AND vulnerability assessment. What do we mean by that? A policy assessment analyzes your organization’s cybersecurity controls and its ability to remediate vulnerabilities. These risk assessments should be conducted within the context of your organization’s objectives, rather than in the form of a checklist as you would for a cybersecurity audit.

A vulnerability assessment is a systematic review of security weaknesses in an information system. It evaluates whether the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and when needed.

Any cybersecurity service that doesn’t include both assessments will leave your institution exposed and more vulnerable to ransomware attacks. Vulnerability scans are like a photograph and show a snapshot in time, and that picture can change daily. Therefore, vulnerability scans should be provided continuously (e.g., daily, weekly or monthly).

2. Ask your cybersecurity partner…

…how they will assist in improving cyber hygiene in the form of patch management, to prevent ransomware attacks from having an access point into your network.

3. Hire a partner to help you create and routinely update your risk register in cooperation with your Board and Office of Risk Management.

Access control and governance issues must be scrutinized by all involved parties. Cybersecurity risk management is comparable to other forms of risk management and is therefore a Board-level issue. For example, did you know an institution can lose access to federal financial aid if it’s found to be out of compliance with national standards, such as National Institute of Standards and Technology (NIST) 800-171?

4. Find a partner who will assist your institution in creating your unique ransomware incident response playbook.

Think of this as your ransomware crisis plan. Off-the-shelf playbooks are fine for understanding concepts, but since your organization’s network architecture, data, and faculty requirements are unique, your institution needs a customized playbook handy should the need arise.

5. Ensure your vendor partner performs or arranges for an annual third-party penetration test.

This “pen test” includes scanning your network for weaknesses and, optionally, attempting to exploit any vulnerabilities that can enable attackers to gain entry. This is critical as new vulnerabilities are discovered every day, and what was thought to be secure may no longer be.

6. An effective partner will audit your security controls against relevant cybersecurity frameworks…

…like TAC § 202 or NIST 800-53 R5, in addition to your state-specific frameworks that may govern data security. This is a regulatory environment that is constantly changing, and your partner should proactively provide you with compliance requirements and discrepancies.

7. Partner with cyber staff who routinely communicate with governmental and law enforcement agencies…

…to provide relevant alerts and trends to your CIO for remediation.

8. Every capable vendor should also be auditing your organization randomly…

…to confirm its compliance with your cybersecurity plan.

“Organizations face a clear and present danger, but the more salient truth is that boards and C-Suite leaders face a clear and present certainty since they bear liability for the failure.” Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Ray Rothrock, 2018.


Via the E&I Columbia Advisory Group (CAG) contract, CAG is available to assist your institution with cybersecurity services, audits, planning, and to help with your ransomware incident response playbook.

CAG clients rank in top tier for COVID-readiness

The Dallas Business Journal recently published the rankings for COVID-related instructional readiness for Texas colleges and universities as ranked by the non-profit Educate to Career. This year, these national rankings indicate how robust the software and systems for distance learning are at each higher-education institution. Two of the Tier 1-ranked Texas institutions, Texas A&M University – Commerce and Texas Woman’s University, are Columbia Advisory Group IT service customers.

Six North Texas universities scored in the highest tier and two in the lowest tier on a ranking of how adaptable they are to life and learning during the COVID-19 crisis.

Educate to Career, a California-based education nonprofit, ranked four-year schools into tiers based on factors including in-classroom instruction, quality and experience with online learning and other factors.

To be in Tier 1, the highest group, schools had to be able to deliver their full curricula online and in-classroom and have a minimum of three years of experience in delivering online curricula. Educate to Career also weighed each school’s tuition and fees.

The North Texas schools in Tier 1 were University of North Texas in Denton, Texas Woman’s University in Denton, the University of Texas at Arlington, Dallas Baptist University, Texas Wesleyan University in Fort Worth, and Texas A&M University-Commerce.

Other Tier 1 requirements include a physical campus for in-classroom instruction should health authorities allow colleges to open in September, robust software and systems to support distance learning programs, faculty experience in teaching online and reasonable tuitions and fees on a relative basis, according to the rankings.

Tier 2 universities have the systems required to deliver curriculum online and in-classroom. However, college faculty have less experience in delivering online curriculum than Tier 1 colleges.

In North Texas, Southern Methodist University and the University of Texas at Dallas (in Richardson) ranked in the second tier, according to Educate to Career.

No North Texas universities ranked in Tier 3, which is described as universities and colleges that “strongly emphasize in-classroom education over online teaching, and may not offer full curriculum online.”

Two North Texas schools ranked in Tier 4, described as colleges and universities that have “limited systems and experience in delivering online curriculum.”

Those were Texas Christian University and the University of Dallas in Irving.

Spokespeople for those two universities did not immediately respond to an email requesting comment about the rankings.

Improving Student Services and Recruitment Through Enhanced ERP

Improving Student Services and Recruitment through Enhanced ERP, SIS and CRM Integration

As higher education institutions strive to maximize actionable insights and student services across existing data pools, the need for complex data integrations continues to grow. When multiple campuses collaborate with curriculum and enrollment processes, the need for systems integration becomes even more critical.

As an IT provider to educational institutions across the country, our Enterprise Resource Planning (ERP) and Student Information System (SIS) teams are seeing increased interest in strategic enrollment partnerships, especially within college and university systems and community college districts. These partnerships require data clearinghouses to allow shared entities to recruit, enroll, receive tuition payments, advise students, and view student grades and course schedules at a central location for access by multiple higher education institutions, and despite variations in the software used at each member institution.

An excellent recent example is the RELLIS campus of the Texas A&M University System. The campus was created to feature high-tech, high-impact research facilities for technology development, testing and commercialization. The campus also features a collaborative education complex which offers multiple academic degrees from many universities within the A&M System as well as from Blinn College campuses, and offers opportunities for workforce skills training to the surrounding communities. CAG’s ERP specialist team was engaged to create a recruiting and candidate tracking system along with a complex data clearinghouse to facilitate enrollment and tuition payments across 10 colleges and universities.

“CAG’s team of IT experts are accustomed to the aggressive timelines and rigorous and evolving demands that an innovative project of this type will naturally entail. Their higher-ed focused IT services team will enable us to move quickly to provide integrated service to both our students and our member campuses,” said Mark Stone, Chief Information Officer for the Texas A&M University System.

In cooperation with leaders from each campus, the CAG team created data feeds from each institution that aggregate in Salesforce to allow students to take courses from any of their universities. The Salesforce CRM front-end allows RELLIS recruiting and marketing staff to drive student enrollment while back-end data feeds are unique to each institution due to disparate Student Information Systems at each university. This allows advisors to manage data from these universities and enter advisory notes that are pushed back to the system of record for each student. To achieve student authentication, CAG also integrated “single sign-on” for the institutions.

It was important to the Texas A&M University System to improve student service by simplifying the tuition payment process. The data solution CAG created allows payments to be made to the central location at RELLIS, and agreed revenue splits are subsequently sent to each institution. The clearinghouse gives students a single system login to view their course schedules and grades, thereby creating a seamless student experience.

For more information or a consultation on your data integration projects, please contact info@columbiaadvisory.com.

Spearphishing Defense Tips for Students

Cyber Criminals Conducting Successful Spearphishing Campaigns Against Students at Multiple College and Universities

Tips to share with students

By David Maxwell, Chief Information Security Officer & Director of the Information Security Practice at Columbia Advisory Group

The FBI has identified successful spearphishing campaigns directed at college and university students, especially during periods when financial aid funds are disbursed in large volumes. The Department of Education identified a similar spearphishing campaign targeting multiple Universities. In this attack, the cybercriminals sent spearphishing emails requesting students’ login credentials for the University. The email invited them to view and confirm their updated billing statement by logging into the school’s student portal. After gaining access, cybercriminals changed the students’ direct deposit destinations to bank accounts.

Protecting Yourself

For a phishing attack to work, the bad guys need to trick you into doing something. Fortunately, there are clues that a message is an attack. Here are the most common ones:

  • It is becoming much easier for cybercriminals today to find or purchase personal information so expect more personalized scams.
  • The email creates a sense of urgency, demanding “immediate action” before something bad happens, like closing your account. The attacker wants to rush you into making a mistake without thinking.
  • You receive an email with an attachment that you were not expecting or the email entices you to open the attachment. Examples include an email saying it has an attachment with details of Financial Aid or a letter from the IRS saying you are being prosecuted.
  • The email requests highly sensitive information, such as your credit card number or password.
  • The email says it comes from an official organization or uses a personal email address like @gmail.com, @yahoo.com or @hotmail.com.
  • The link looks odd or not official. One tip is to hover your mouse cursor over the link until a pop-up shows you where that link really takes you. If the link in the email doesn’t match the pop-up destination, don’t click it. On mobile devices, holding down your finger on a link gets the same pop-up.
  • You receive a message from someone you know, but the tone or wording just does not sound like him or her. If you are suspicious, call the sender to verify they sent it. It is easy for a cyber attacker to create an email that appears to be from a friend or coworker.

If you believe an email or message is a phishing attack, simply delete it or send it as an attachment to Email@Domain.edu. Ultimately, common sense is your best defense.

Do you need help managing cybersecurity at your educational institution? Contact one of our experts about cybersecurity assessments and fractional ISO services. 

Supplier Spotlight: Columbia Advisory Group

In conversation with Steve Erwin: Trends and Challenges for IT security in education
Our own Steve Erwin, Senior Vice President & Chief Technology Officer talks about present day trends and challenges for IT security in Education with E&I Cooperative Services. Click here for detailed interview.

Read More: https://www.eandi.org/resources/ei-blog/supplier-spotlight-columbia-advisory-group/