How to Value the Cost of a Data Breach

As the Founder and CEO of a technology consulting firm, there are many proprietary data concerns that we must consider and protect, not the least of which is our client information. While our firm, Corporate Technologies, Inc (CTI). may not be directly subject to data security regulations, providing services to many of our clients obligates

How the Student Lifecycle Met LCME Big Data

The Liaison Committee on Medical Education (LCME) accreditation process for medical schools within the United State and Canada is a very intensive and time consuming process. As it should be, given the goal of these schools is to turn out some of the best medical professionals in the world.  One could argue that the LCME

The Art of Social Media Analytics

In our latest blog the “CTI CustomerUniverse was not created by the Big Bang Theory” my colleague, Mark Janowicz, describes how through a systematic approach, using data and technology, we help businesses glean true insights about their customers.  Continuing this important and interesting topic, I’d like to focus on the Social Media Analytics of the

Is your manual Incident Response up to snuff?

Do you believe what the security experts say? That bad actors will penetrate your network, so it’s not a question of “if” but “when”? Believe it or not, it’s true. The evidence is clear that even well-funded security teams can’t keep hackers out.  The paradigm has shifted and the new focus needs to include how

CTI CustomerUniverse was not created by the Big Bang Theory

The other day a colleague and I were discussing closed loop marketing (CLM) and what it really means in the marketplace.  In the end, marketing is trying to capitalize on customer to drive more revenue.  An interesting thing happened as we were discussing what enables you to do CLM and how to capitalize on customer,

There is no immunity from cyber attacks, so be prepared

Threat Assessment

Devastating cases of cyber-attack scenarios continue to mount. Unfortunately,  the most recent high-profile example is a harbinger of things to come.  By now, everyone is at least peripherally aware of the WannaCry ransomware attack that occurred just a few weeks ago.  If you somehow missed it, the WannaCry ransomware attack was a worldwide exploit by


© Corporate Technologies, Inc.   |  Privacy & Legal