Tech content writer specializing in health IT, cybersecurity, and telecoms. Clients include AWS, Redox, Corellium, and many more. I am currently working on my Google Digital Marketing certification.
Understanding GCP IAM Roles
Summary: In this article, we will provide an in-depth overview of Google Cloud Platform (GCP) identity and access management (IAM) roles. You’ll learn about how GCP IAM works and the different types of roles that can be delegated to users as well as when those roles are most appropriate in the GCP environment. By the end of this article, you’ll have a clear understanding of the pros and cons of each different role type as well as their limitations and have a GCP IAM Roles cheat sheet that adm...
Understanding the Difference Between IAM Roles and Policies in AWS
Summary: In this article, we will discuss the similarities and differences between identity and access management (IAM) roles and policies in Amazon Web Services (AWS). You’ll learn the difference between AWS roles vs. policies and see examples of each. By the end of this article, you’ll have a clear understanding of what distinguishes an AWS role from a policy, in addition to understanding the difference between IAM roles, users, and groups.
The difference between IAM roles and policies in A...
Health System Achieves Epic Beaker Activation Success With CTG
“CTG’s attitude was what I appreciated the most. Their staff had a general willingness to help in any way possible to ensure our success. They always asked, ‘How can we help more?’ CTG’s approach was very refreshing. They did an excellent job and were very communicative. The activation was very well done and exceeded our expectations.”
—Health System Executive
Optimizing Lab Operations
Our client is a large not-for-profit hospital system with 22,000 healthcare employees and 12 hospitals.
The ...
CTG Drives Quality Assurance for Global Pharmaceutical Leader's Clinical Trials
The client is one of the world's leading pharmaceutical manufacturers, with a century-long legacy of developing innovative treatments. Founded in the U.S., they have grown into a global pharmaceutical powerhouse with a company culture focused on research excellence and quality in drug development.
The Challenge and Opportunity
Like many pharmaceutical companies, the client faced increasing complexity in their clinical trials management while needing to maintain strict regulatory compliance. W...
CTG Enables Anchorage Water & Wastewater Utility’s Contact Center Transformation
Anchorage Water and Wastewater Utility (AWWU), owned and operated by the Municipality of Anchorage, stands as Alaska’s premier water management organization. As the steward of one of the world’s most pristine water systems, AWWU manages an 850-mile-long distribution network that processes over 8.4 billion gallons annually and serves 40,000 customers.
In Their Words
“CTG provided exceptional support during the initial Lead/Copper Rule notification to AWWU customers. CTG demonstrated unwavering...
Amazon Lex: A Lifeline for Healthcare Organizations in the Post-Nuance Era
Microsoft's August 2024 announcement stated that healthcare organizations have until June 2026 to migrate away from Nuance IVR products—a remarkably quick turnaround for any healthcare organization. That being said, many organizations have already missed the window for 2025 budgets, forcing them to compress their migration into early 2026.
Having been a staple of the contact center infrastructure for nearly two decades, many healthcare organizations rely on Nuance IVR systems to front end the...
Top 5 Cybersecurity Pitfalls in Operational Technology (OT)
As the cybersecurity landscape for operational technology continues to evolve, many organizations using it still struggle with fundamental security practices. Recent incidents, including state-sponsored attacks from Russia and China targeting critical infrastructure, have highlighted the urgent need for robust cybersecurity measures across the energy industry. In this article, we’ll dive into five critical cybersecurity pitfalls related to operational technology as well as some actionable sol...
The DNA of Healthcare Cyber Resilience: Why Culture and Communication Define Your Cyber Defense
More than a year after the unprecedented Change Healthcare cyberattack, its repercussions still ripple through the industry. In fact, Change Healthcare continues to issue breach notifications to affected patients while simultaneously working to restore its market reputation.
At a recent CHIME Focus Group during ViVE 2025, participants voiced deep concern about another such breach. They emphasized the need for better communication, collaboration, and shared responsibility across departments an...
The Doctor (And AI) Will See You Now: How Clinicians Can Bolster Trust Using AI
The artificial intelligence revolution has arrived in healthcare, with the technology transforming everything from diagnostics to drug discovery to personalized treatments—processes largely unseen by the patient but which improve their lives.
Despite this positive impact, research shows there are ongoing concerns about the use of AI in healthcare generally. According to a Pew Research survey, 57% of Americans say the use of AI for clinical interactions, such as disease diagnosis and treatment...
Dataminr 2024 U.S. Election Security Checklist
Security Operations, Cybersecurity, Public sector
The 2024 U.S. presidential election is turning out to be a race like no other. And regardless which political party wins, it has been deemed a top risk—one that “will be by far the most consequential for the world’s security, stability, and economic outlook,” according to Eurasia Group’s Top Risks for 2024.
In fact, the first major election-related cyber attack has already occurred: a hack into the presidential campaign of GOP nominee Donald T...
What You Need to Know About Generative AI
Imagine you had the ability to call upon thousands of years of human experience, writing, art and media from a single prompt. That is the power of generative AI, a technology that has revolutionized various industries and is poised to be one of the most i...
Your guide to healthcare compliance for small and mid-sized technology organizations
Healthcare compliance has been the subject of much debate for as long as health and human services have existed in the United States and across the globe. While we could sit here and go over the myriad intricacies of laws in the healthcare industry, it would be wiser (and more time efficient) to discuss the impact patient data can have on your organization.
SOC 2 mapping: Infrastructure and data security
With the risk landscape changing every single day due to a number of different reasons like constantly evolving cyber-attacks to changing regulatory requirements, it can be hard enough for organizations to thrive in the modern digital world.
Why every business needs a business continuity and disaster recovery plan
A business continuity and disaster recovery plan will strike many business owners as a ‘nice to have’ rather than a must-have. Or you might think it’s essential for certain business functions (like IT) but less important in others (like PR, Comms, or HR teams.)
We’re here to break the news that you absolutely do need a business continuity and disaster recovery plan for your business. Not having one leaves your business vulnerable to threats — from cyber-attacks to natural disasters.
Your guide to implementing an ISO 27001 backup policy template
Business continuity, data protection, compliance, and disaster recovery are all tied to the ISO 27001 security framework, so not having a backup policy in place in your business continuity plan can spell disaster for your entire organization.