Tag Archives: Management

ApplyLogic Ranked on Inc. 5000’s Fastest Growing List for Third Year in a Row!

ApplyLogic Consulting Group, LLC is proud to announce that we have ranked on the 2017 Inc. 5000 list of America’s fastest-growing private companies. This is the third year in a row with our continued growth in the Federal Information Technology sector.

“I am excited and proud of the ApplyLogic staff as we continuously exceed customer expectations, growing the services and mission support we provide,” said Jeff Ramella, Founder and President of ApplyLogic Consulting Group, LLC.

ApplyLogic, a Virginia based, veteran owned small business, provides services and solutions such as:

  • ApplyLogic Data Analytics Portfolio Tool
  • Cloud (AWS and Azure)
  • Cybersecurity
  • Network & System Engineering
  • Project Management Solutions.

About Inc. 5000
Inc. magazine, founded in 1979 and based in New York City, is an American monthly publication focused on growing companies. The Inc.5000 is ranked according to percentage revenue growth over a four-year period. The Inc.5000 is an expansion of the previous Inc.500, which now ranks the country’s top 5000 fastest-growing private companies.

About ApplyLogic Consulting Group, LLC.
Founded in 2004, ApplyLogic is a privately held, veteran owned small business with corporate headquarters in Dunn Loring, Virginia. ApplyLogic, a Virginia based, veteran owned small business, provides services and solutions such as: ApplyLogic Data Analytics Portfolio Tool, Cloud (AWS and Azure), Cybersecurity, Network & System Engineering, Project Management solutions for the Federal Information Technology sector.

Tagged , , , , , , , , , ,

ApplyLogic Ranked on Inc. 5000’s Fastest Growing List for Second Year in a Row!

ApplyLogic Consulting Group, LLC is proud to announce that they have ranked on the 2016 Inc. 5000 list of America’s fastest-growing private companies. The company made the list for the second year in a row with its continued growth in the Federal Information Technology sector.

NEW YORK, August 17, 2016 – Inc. magazine today ranked ApplyLogic on its 35th annual Inc. 5000, the most prestigious ranking of the nation’s fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment— its independent small businesses. Companies such as Microsoft, Dell, Domino’s Pizza, Pandora, Timberland, LinkedIn, Yelp, Zillow, and many other well-known names gained their first national exposure as honorees of the Inc. 5000.

“Being on the Inc.5000’s list for the second consecutive year is a significant achievement and not possible without the support of our talented staff and customers,” said Jeff Ramella, Founder and President of ApplyLogic Consulting Group, LLC, about the inclusion of ApplyLogic on the list. “We’ve worked very hard to sustain and grow our business over the past year. It’s nice to have our results publically acknowledged on a national level.”

ApplyLogic, a Virginia based, veteran owned small business, provides tools and solutions such as:
• The ApplyLogic Data Analytics Portfolio Tool
• IT Staffing Solutions
• IT Professional Services such as Cybersecurity, Network & System Engineering and Project Management Solutions.

About Inc. 5000
Inc. magazine, founded in 1979 and based in New York City, is an American monthly publication focused on growing companies. The Inc.5000 is ranked according to percentage revenue growth over a four-year period. The Inc.5000 is an expansion of the previous Inc.500, which now ranks the country’s top 5000 fastest-growing private companies.

About ApplyLogic Consulting Group, LLC.
Founded in 2004, ApplyLogic is a privately held, veteran owned small business with corporate headquarters in McLean, Virginia. ApplyLogic, provides customers with tools and solutions such as: The ApplyLogic Data Analytics Portfolio Tool, IT Staffing, and IT Professional Services such as Cybersecurity, Network & System Engineering and Project Management solutions for the Federal Information Technology sector.

 

Tagged , , , , , , , , , ,

Disruptive Age?

A quick read offers an agile perspective on resource management; shifting from plan-based to adaptive and focusing on finishing projects, instead of starting them.  http://www.slideshare.net/rallysoftware/c-connor-pmirockymtntalk

 

Tagged , , ,

ApplyLogic has been nominated for SECAF’s Government Contractor of the Year.

SECAF AwardGreat news! ApplyLogic has been nominated for SECAF’s Government Contractor of the Year. SECAF’s 6th Annual Award honors small and emerging government contractors. We are proud of the ApplyLogic Team and excited about the nomination and recognition for the hard work we provide: servicing and delivering quality solutions to our customers! Way to go ApplyLogic!

Tagged , , , , , , , , , ,

What Is Your Decision…

The elections in the United States is drawing close, tomorrow, and it is important to remember that you need to make decision. Now this is not to discuss your decision on which president you select, but rather the risk your company chooses to select.

Risk is an issue that is a critical factor every day of the year to your business. The recent effects of Sandy and the potential impact of new a new storm could paralyze the already devastated North East. Your business needs to make decisions that will limit its exposure to risk, whether it is financial, natural, or technical. So, during this time of decision-making, make sure you make a commitment to evaluate your companies risk on a regular basis and plan effectively. Remember…risk is not static and your business should not be either.

Tagged , , , , , , , , ,

South Carolinas’s Majority of Social Security Numbers Exposed…

In an article in Dark reading, South Carolina officials announced that more than three-quarters of the states social security numbers were exposed in a recent hack. The data included debit and credit card information for the states residents as well. The most concerning issue was that the database that was compromised was not encrypted. As a state agency, it should have been an example to follow rather than one to avoid. The state’s Department of Revenue should have been held to not only federal regulatory requirements, but also PCI. This type of failure is not acceptable.

While not everything has been released as to the cause other than the database was breached and not encrypted, the article states the following:

Although state officials referred to the hack as a “database” breach, they didn’t specify just what flaw was exposed. Security experts say it was most likely a SQL injection or other vulnerability in the Web-based application that ultimately led to the data breach.

Chris Eng, vice president of research for Veracode, says it sounds like a SQL injection attack against a Web application. “That’s the simplest way in,” he says.

It is easy to make conjecture about how the breach occurred, but it would seem that the necessary due diligence was not followed. Security should be more than a check-box. States and Federal governments should be setting the examples for the rest of business…Another instance where measure twice and cut once should have been put in place…

Tagged , , , , , , , , , , , , ,

Are You Satisfied With Nothing…

Are you a small business? Are you satisfied with your customer and business data security? According to a recent survey of small businesses by Symantec and National Cyber Security Alliance, 86% state that they are. In an article in SC Magazine published 10/22, some of the interesting details of the survey are discussed.

According to the article, even those 86% are satisfied with the level of security protecting the customer and business data of their businesses. In addition, 77% of those small businesses surveyed believe that their business is safe from any breach. According to the article about the survey, the following is what is most concerning:

However, 87 percent of respondents have not written a formal security policy for employees, 83 percent lack any security blueprint at all and 59 percent have no plan in place to respond to a security incident.

These statistics are very concerning. If you take this survey of 1,015 small businesses (250 employees or less) as a reasonable grouping of all small businesses this survey is frightening. Even if you take it with a grain of salt, it is scary that no planning is being put in place for most. One can only assume why a business would not put a plan, even one that is basic, in place. Is it the cost of security or the thought that “this business is too small to be hit” mindset? What ever the rationale used to make the decision, it was a decision to accept that risk of compromise and breach, but as more and more businesses begin to use cloud services and other mechanism on the Internet, they are turning from an obscure local “mom and pop” business to one with a larger footprint that can span the globe.

Preparation is always a wise decision. Regardless if you document that you buy the top of the line next-gen firewall and intrusion protection system or just change the Linksys encryption from WEP to WPA-2 and change the default admin password, the documented plan is a step in the right direction. Remember it is important to measure twice and cut once.

In closing the following quote is something for everyone to consider:

“Invincibility lies in the defence; the possibility of victory in the attack.” — Sun Tzu

Tagged , , , , , , , , , , , , , ,

Phishing for HTML 5…

The blog, Feross.org, posted a good article on using HTML5 for phishing on Oct 8th. Now, to most security professionals, this type of attack will be easily bypassed, but this type of attack is meant for the same group fo people who help feed the African Prince that is trying to pay you by transferring his money through your bank account. In addition, this also targets those people who do not validate the websites they go to or allow scripting on all sites.

This article could be used to help educate, although in a highly technical way, users in how to look for and prevent the success of this type of attack. It is important that all the technical defenses applied to a network or system can be circumvented by uneducated or unaware users that do not practice proper security principles.

Tagged , , , , , , , , , , , , , , , , ,

Taking the Hacker and Heading Home…

Many may have heard of the ongoing dispute between England and the United States about the pending extradition of British hacker Gary McKinnon. Well the wait is over, the British Home Secretary Theresa May in an announcement yesterday before Parliament stated that she would block the extradition of Gary McKinnon. She based her decision on the several medical examinations and his Asperger’s Syndrome diagnosis. He has been charged by the United Stated for hacking into highly classified Pentagon computer systems, for what McKinnon alleges in search of proof of extraterrestrial evidence.  USAToday.com has a good article on the coverage.

According to the article:

Officials in Washington expressed disappointment at the outcome, and State Department spokeswoman Victoria Nuland said the decision meant McKinnon would not “face long overdue justice in the United States.”

British prosecutors will now decide if he should face charges in the U.K.

There has also been discussion that England will also renegotiate the extradition treaty to make it harder for British citizens to be extradited to the United States.

Tagged , , , , , , , , , ,
%d bloggers like this: