Wilson Consulting Group, LLC

WCG offers an extensive range of cybersecurity, IT governance, and risk and compliance services that

To utilize industry best practices to develop innovative, secure and optimal technological solutions that reduce risk to organizations and government entities.

06/18/2024

According to NBC News, Ascension, the largest Catholic hospital chain in the U.S. was hit by a attack last month. The successfully infiltrated the network and stole files from seven of the thousands of servers. Since May 8, the electronic system managing patients' medical records has been largely inaccessible at Ascension Wisconsin hospitals, clinics, and other locations.

How did Ascension get hacked? In a statement released, Ascension revealed that an employee at one of their facilities mistakenly downloaded a file containing malware, believing it to be legitimate.

The Ascension ransomware incident underscores several critical lessons for healthcare organizations:

- Disaster Recovery and Data Resiliency: It is imperative for healthcare organizations to establish robust disaster recovery processes and ensure the resilience of their data systems. This includes regular backups, testing of backup restoration procedures, and having contingency plans in place to mitigate the impact of ransomware attacks or other cyber incidents.
- Security Measures: This involves implementing security best practices such as regular vulnerability assessments, network monitoring for suspicious activities, and ensuring systems are patched and up-to-date with security updates.
- Employee Training and Awareness: Comprehensive security training should be conducted regularly across all levels of the organization. Employees need to be aware of phishing techniques, malware risks, and proper handling of sensitive data. This awareness can significantly reduce the likelihood of incidents caused by human error.

👉Learn more at https://wilsoncgrp.com/network-security-awareness-training-and-development

06/07/2024

In today's digital age, safeguarding your organization's data and maintaining customer trust are paramount. A System and Organization Controls ( ) audit provides a comprehensive evaluation of your internal controls, ensuring they meet Trust Service Criteria for security, availability, integrity, confidentiality, and privacy.

What will you gain from a SOC Audit?

✅Better understanding of how risks are addressed in similar organizations in the same industry.
✅Enhanced organizational reputation and overall reduction of risk as a result of the ability to correct weaknesses and gaps identified in the report.
✅Savings in time and money – taking away the hassle of dealing with auditors and non-core activities.
✅Improved customer confidence in your organization’s Trust Service Criteria.
✅Increased shareholder confidence in designed controls to effectively mitigate risks.

Invest in a SOC audit to protect your business and foster trust with your stakeholders. Let WCG partner with you to keep your organization and your clients assured of the integrity of your services. 🌐 Learn more at https://wilsoncgrp.com/system-and-organization-controls-soc-audit

06/05/2024

According to a post on the Shelf Talk Blog, the Seattle Public Library has been hit by a “ransomware event” on May 25, causing disruptions to a number of online services offered by the Library. Public computers, online catalog and loaning system, e-books, and in-building Wi-Fi were among the knocked-out services, which remained down on May 28.

has become a lucrative business for hackers around the world, often targeting large corporations or institutions that can afford to pay millions of dollars. But this is not the first time a major American city’s library system has been targeted. In 2021, the Boston Public Library fell victim to a , though it remains unclear whether any ransom was paid to restore its systems.

Does your organization prepare a detailed incident response plan for ransomware and other disruptions? Is it regularly tested and updated for effectiveness? Examine your readiness today 👉 https://wilsoncgrp.com/contact-us

05/31/2024

Have you achieved requirements as follows?

- The Financial Privacy Rule: it requires financial institutions to protect the privacy of consumers, which covers most personal information (name, date of birth, and Social Security number) as well as transactional data (account or credit card numbers).
- The Safeguards Rule: this requires all financial institutions to design, implement, and maintain security measures to protect private information.
- The Pretexting Rule: this encourages financial institutions to develop safeguards for pretexting, also known as social engineering.

Wilson Consulting Group offers customized GLBA Compliance solutions. Take the first step towards peace of mind – Partner with us today
👉 https://wilsoncgrp.com/gramm-leach-bliley-act-compliance

05/29/2024

According to Lincoln, a woman was scammed out of nearly $9,000 after falling for a scam on May 8th. Before utilizing the PayPal app for transactions, it is essential to familiarize yourself with potential scams that may occur on the money management platform. Are you aware of the latest PayPal in 2024 and how to prevent them?

① PayPal tech support or customer service scam: pretend to be PayPal employees to lull users.
➡️Prevention: Keep in mind that genuine support teams are there to assist you only upon your request, and they won't ever request payment to resolve an issue. Only communicate with customer service through an official app or website.

② PayPal verification scam: Fake verification scams mostly use phishing emails.
➡️Prevention: Visit the PayPal website or app to verify your information securely instead of clicking on a link in an email.

③ PayPal invoice scam: Cybercriminals create realistic invoices to trick users into paying for products or services neither desired nor received.
➡️Prevention: Examine invoices using the PayPal app or website. If any purchases seem unfamiliar, refer to your order history. Should discrepancies arise, promptly reach out to the seller for clarification.

05/27/2024

Today, gathering with loved ones under the bright May sky, we pause to honor those who gave everything to our country. “As we express our gratitude, we must never forget that the highest appreciation is not to utter the words, but to live by them.”

05/24/2024

Numerous organizations across a wide swath of industries have recently reported a dramatic rise in intrusion attempts and . In order to minimize the window of opportunity for attackers, it is important to continuously assess and act on new information to identify vulnerabilities and remediate them.

Wilson Consulting Group provides Vulnerability Assessment Services to identify, classify, remediate, and mitigate vulnerabilities within an organization’s internal, external, database, web application environment. A detailed vulnerability analysis report will be prepared by our security experts and delivered to the client.

Start your journey with WCG! Contact us at https://wilsoncgrp.com/vulnerability-assessment

05/22/2024

In today's business landscape, websites play a pivotal role for all companies. They manage a spectrum of tasks, ranging from e-commerce transactions and customer data management to marketing and beyond. From 2013 through today, it’s estimated that 3,809,448 records have been and continue to be exposed by every single day, including websites.

Has your website ever undergone the ? Are you wondering how you can tell whether your site is being hacked or not? Let us take a close look at some common signs of a hacked website:

➊ Your Google search results contain spam keywords.
➋ You find unfamiliar JavaScript in your website HTML code.
➌ You see browser warnings when visiting your site.
➍ Your site unexpectedly redirects to other pages.
➎ Your site displays unwanted ads or pop-ups.
➏ Your hosting provider disabled your website.
➐ A huge number of new pages have recently been indexed.

If your website displays signs of compromise but you are unsure about the next steps, don’t hesiPotato to reach out to us: https://wilsoncgrp.com/contact-us

05/20/2024

It is reported that Maryland Governor Wes Moore signed the Maryland Online Data Privacy Act on May 9, 2024. This legislation introduces obligations regarding transparency, assessment, and consumer rights for covered organizations.

💡 Who does MODPA affect?

MODPA applies to organizations that: (i) operate in Maryland; or (ii) offer services or goods to Maryland residents, and, in the previous year, met either of the following criteria:
Handled or processed personal data of at least 35,000 Maryland consumers, excluding data used solely for payment transactions.
Handled or processed personal data of at least 10,000 Maryland consumers and earned over 20 percent of their revenue from personal data sales.

💡 What is the timeline of compliance?

While MODPA becomes effective on October 1, 2025, it does not "have any effect on or application to any personal data processing activities before April 1, 2026,". This grace period does allow organizations more time to adapt to the law's intricacies. Nonetheless, this extended timeline shouldn't be interpreted as a reason to postpone decision-making, as implementing the law's requirements will require significant efforts.

Wondering if this will affect your business? Contact us at https://wilsoncgrp.com/contact-us

05/17/2024

Wilson Consulting Group is an innovative global cybersecurity consulting firm headquartered in Washington D.C. We specialize in IT governance, risk management, and compliance consulting services, providing our clients with strategic guidance, technical solutions, and business advice to best serve their individual needs.

Our top-notch services include, but are not limited to:

1️⃣ Cyber Security Assessment: Assess the cybersecurity posture of an organization’s digital environment.
2️⃣ Risk Management and Assessment Services: Identify your organization’s security vulnerabilities, inefficiencies, and noncompliance with standards for security policies that are of low-, medium-, and high-risk.
3️⃣ Cloud Services: Effectively design a cloud strategy and securely implement cloud infrastructure.
4️⃣ Cybersecurity Maturity Model Certification ( ): Help maintain and win DoD contracts with CMMC Consulting and Implementation services.
5️⃣ FedRAMP Advisory and Assessment Services: Achieve and maintain your FedRAMP Authority to Operate (ATO) with a reliable certified 3PAO.

Empower your business with Wilson Consulting Group's stellar solutions! 💪🌟 https://wilsoncgrp.com/contact-us

05/15/2024

extend beyond big corporations and governments; small businesses are equally susceptible. According to Forbes, small businesses are more vulnerable to . Even amidst limited staffing and budget constraints, small-business owners cannot overlook cybersecurity.

Are you wondering what affordable steps and resources can help small businesses harden cybersecurity posture?

🅐 Disallow access to personal applications and non-business websites.
🅑 Use a password manager equipped with multifactor authentication (MFA) to manage and generate strong passwords.
🅒 Implement the cloud to benefit from the built-in security services offered by cloud vendors.
🅓 Regularly audit and remove unused/inactive accounts and services.
🅔 Periodically (e.g., monthly, quarterly) educate and train your staff on cybersecurity best practices.

Have no idea where to start? Contact us to get a free consultation today.

05/13/2024

The Gramm-Leach-Bliley Act ( ), also known as the Financial Modernization Act of 1999, is a United States federal law that mandates financial institutions to disclose information-sharing practices to their customers and proactively secure sensitive data.

is applicable to financial institutions offering any financial products and services to individuals, such as loans, debt collection, financial advice, investment advice, or insurance. These include but are not limited to:

✔ATM operators
✔Banks
✔Car rental companies
✔Check-cashing businesses
✔Consumer credit reporting agencies
✔Credit counseling services
✔Courier services
✔Credit card companies
✔Etc.

In 2021, the FTC issued amendments that were approved by its governing agency, the GLBA, thus updating the compliance requirements for higher educational institutions with a financial connection to the Title IV Program: “Any institution that receives Title IV funding must now comply with the Gramm-Leach-Bliley Act (GLBA).”

Are you GLBA compliant? Get your free consultation meeting with us today. https://wilsoncgrp.com/gramm-leach-bliley-act-compliance

05/10/2024

Protecting sensitive and proprietary data from cyber threats is a constant challenge for small businesses and organizations. A company’s success depends on its ability to counter internal and external attacks, while staying one step ahead.

As your trusting cyber security consultant, we provide a systematic and repeatable approach for assessing the cybersecurity posture of an organization’s cyber environment. Benefits of our Cyber Security Assessment include, but are not limited to:

1. Identify vulnerabilities. WCG’s Cyber Security Assessment Services identify the client’s security vulnerabilities, inefficiencies, and noncompliance’s with standards for security policies that are of low-, medium-, and high-risk. We help the organization to understand the insufficiency and the drawback in the security policies.
2. Improve communication and decision-making. With our Cyber Security Assessment Services, a thorough cyber risk assessment report containing a list of the threats and risks for your organization will be provided so that management and employees are on the same page about identifying and eradicating threats.
3. Increase cyber security awareness. Our training of general security awareness helps to spread the awareness of risk assessment of cyber security in your organization. Your employees will feel that the work they do and the data they form is essential to the organization and they want to keep it safe.

Recognize and minimize threats and protect critical information systems and assets with WCG’s Cyber Security Assessment Services. Contact us today👉https://wilsoncgrp.com/cybersecurity-assessment

05/01/2024

Two-step verification ( ) enhances security by necessitating users to authenticate themselves through two different means before gaining access to a secure system. To bolster the challenge against outsiders or hackers attempting to replicate the verification process, 2SV incorporates authentication factors from three distinct categories:

1. Knowledge factors, such as passwords, PIN codes, or answers to security questions.
2. Biometric factors, encompassing unique genetic traits like fingerprints, facial recognition, and vocal characteristics.
3. Possession factors, which entail physical items exclusively possessed by the user, such as smartphones and thumb drives.

While commonly used interchangeably, there are nuanced disparities between 2-step verification and 2-factor authentication ( ):

1. 2-step verification entails two consecutive authentication steps, like a username/password combination followed by a code.
2. Conversely, 2-factor authentication (2FA) mandates two separate authentication factors from different categories, such as knowledge and biometric.

Uncertain about your posture? Reach out to us today for a Dark Web Assessment to evaluate the exploitability of your organization's and digital assets. https://wilsoncgrp.com/penetration-testing

04/29/2024

The California Consumer Privacy Act ( ), widely regarded as the most extensive consumer in the United States, applies to all business entities that collect personal data of consumers in California regardless of their size and location.

If your company is serving or employing California residents, it is recommended to start the process of becoming compliant today. The following steps need to be implemented in CCPA Compliance meticulously:

1. Conduct a complete data inventory. Make sure you have a thorough understanding of the scope of personal data being stored on company IT infrastructure, and the degree to which the business is “selling” data.
2. Communicate the rights of individuals to the data they provide from time-to-time. Your team will be obliged to provide individual customers with an update within 45 days of the inquiry.
3. Ensure every business unit – including marketing and business development understand that every new customer has the right to opt-out of data selling.
4. Be sure to update service-level agreements with third-party data processors.
5. Remediate information security gaps and system vulnerabilities.

WCG is your trustworthy CCPA service provider who will partner with you to determine your business’ compliance gaps with Services and assist you to become compliant. Contact us today
👉https://wilsoncgrp.com/california-consumer-privacy-act-ccpa-compliance

04/23/2024

Malware, short for "malicious software," is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, or gain unauthorized access to organizations’ information or systems.

Types of Malware include, but are not limited to virus, worms, Trojans, ransomware, spyware, and adware. 💡How can organizations determine if their digital assets have a malware infection?

Here are some telltale indicators that malware is present on your system:

1. Your operating system slows down.
2. Your screen is inundated with unexpected pop-up ads.
3. You notice a mysterious loss of disk space and increase in the system’s Internet activity.
4. Your antivirus product stops working and cannot be turned back on.
5. You lose access to your files and see a ransom note on your desktop.

Need help with Malware prevention and inspection? Contact us today. https://wilsoncgrp.com/contact-us

04/20/2024

stands for the Federal Information Security Management Act. This act is required for the federal agencies to develop, document, and implement an management program for giving safeguard to their information systems which even includes those who are provided or managed by another agency, contractor, or third party.

What can you gain from ?
- Ensuring the safeguarding of your organization's sensitive data.
- Safeguarding government information and assets by upholding confidentiality, integrity, and availability, thus avoiding penalties.
- Strengthening the capacity to address vulnerabilities promptly.
- Implementing continuous monitoring practices to bolster security against evolving threats.

Achieve and maintain your FISMA Authority to Operate (ATO) with a reliable certified Third-Party Assessment Organization (3PAO) today. Learn more at👉https://wilsoncgrp.com/federal-information-security-management-act-fisma-assessment

04/19/2024

A Privacy Impact Assessment (PIA) is a systematic evaluation process used to identify and assess potential privacy risks and impacts associated with the collection, use, and handling of personal information within an organization.

U.S. federal law requires compliance and commitment to ensure personally identifiable information (PII) is managed with the utmost priority and care. All systems that collect PII must be evaluated to determine how information is collected, secured, stored, retrieved, shared, and managed.

Wilson Consulting Group offers comprehensive PIA services designed to help your organization identify, evaluate, and mitigate privacy risks. Why not be one step ahead by protecting personal data within your organization now?

Learn more at: https://wilsoncgrp.com/privacy-impact-assessment

03/20/2024

According to , Group became the object of a attack launched last month by a hacker affiliated with ransomware gang ALPHV. As a result, hospitals, pharmacies, and other health care providers have either been unable to access the popular payment platform, or have purposefully shut off connections to its network to prevent the hackers from gaining further access.

UnitedHealth Group is currently facing a class action lawsuit after a significant amount of data and privacy were breached during the ransomware .

Healthcare breaches are disrupting pharmacies and hospitals nationwide. Don’t let this happen to your institution/organization. Recognize and minimize cyber security threats and protect critical information systems and assets with WCG’s Cybersecurity Assessment and HIPAA Compliance Consulting. Contact us today [email protected]


Image Source: United Healthcare Website

03/12/2024

is the process of identifying security weaknesses and flaws in systems and software running on them, which protects organizations from . Some of the different types of security vulnerability scans include the following:

👉Network-based scans – identify possible network security attacks. This type of security vulnerability assessment also detects vulnerable systems on wired or wireless networks.
👉Host-based scans – locate and identify vulnerabilities in servers, workstations, or other network hosts. This type examines ports and services that may also be visible to network-based scans.
👉Wireless network scans – focus on points of attack in the wireless network infrastructure.
👉Application scans – test websites to detect known software vulnerabilities and incorrect configurations in network or web applications.
👉Database scans – identify the weak points in a database to prevent malicious attacks, such as SQL injection attacks

Secure your organization’s resources from inside and outside threats with our Vulnerability Assessment: https://wilsoncgrp.com/vulnerability-assessment

03/04/2024

is the practice of safeguarding digital networks, devices, and data from unauthorized access by malicious attackers or unintentional activity. It is also known as information technology security.💻🕵️‍♂️
Are you aware of the following types of cybersecurity?
👉Network Security: Monitoring and responding to risks within networks which includes firewalls, intrusion detection systems, and secure communication protocols.
👉Cloud Security: Safeguarding cloud-based assets, including applications, data, and infrastructure. It operates under a shared responsibility model, where cloud service providers handle security for the cloud environment, while organizations secure what is within the cloud.
👉Endpoint Security: Shielding devices and data. It focuses on securing individual endpoints (such as computers, smartphones, and IoT devices) from threats.
👉Application Security: Preventing unauthorized access and use of applications and connected data. It focuses on identifying flaws during the design and development phases to protect against vulnerabilities.
👉Information Security: Protecting the integrity and privacy of data, both in storage and in transit. Data Security is a subset of Information Security.
Learn more at https://wilsoncgrp.com/cyber-security-consulting-services

02/06/2024

Data breach is a security incident that exposes organizations’ confidential or sensitive
data to unauthorized parties. In order to safeguard your organization’s digital infrastructure, and bring resilience to your privacy and data, take the following steps to prevent data breach:

1. Develop a robust security plan to outline the steps, policies, and practices that
are to be followed.
2. Educate and train employees on best practices for data security.
3. Use encryption to protect sensitive data both at rest and in transmission.
4. Restrict access to data by implementing a least-privilege policy and multi-
factor authentication.
5. Conduct regular security audits identify any risks and vulnerabilities. And most importantly, reevaluate after vulnerability patch and remediation.
6. Develop and test an Incident Response Plan and Policy to mitigate the impact of a data breach.

By combining these preventive actions. organizations can significantly reduce the risk of data breaches and enhance the overall security posture.

Have no idea where to start? Connect with our experienced security consultants today! https://wilsoncgrp.com/contact-us

02/01/2024

The Kansas City Area Transportation Authority (KCATA) disclosed a ransom cyber-attack that took place on Tuesday, Jan. 23, resulting in communication disruptions. As IT applications, operating systems, devices, and networks become more pervasive, so too do threats and vulnerabilities.
Are you aware of the following types of cyber-attacks that may threaten your organization’s security and privacy?

1. Malware: Malicious software designed to harm computer systems, including viruses, worms, Trojans, and spyware.
2. Phishing: Deceptive tactics, like fake emails or websites, to trick individuals into sharing sensitive information.
3. Ransomware: Software that encrypts data, demanding payment for decryption keys and posing a threat to data integrity.
4. Man-in-the-Middle: Intercepting and potentially altering communications between two parties who believe that they are directly communicating with each other.
5. SQL Injection: Exploiting vulnerabilities in web application databases by injecting malicious SQL code.
6. Zero-Day Exploits: Exploiting undiscovered vulnerabilities before developers can create patches.
7. DNS Tunneling: Exploiting the Domain Name System (DNS) to establish covert communication channels between a compromised system and a malicious server.
8. XSS Attacks: A web vulnerability where attackers inject malicious scripts into web pages that are viewed by other users.

Do you have countermeasures in place? Evaluate the threats and vulnerabilities to your organization’s information systems and environment with WCG’s Vulnerability Assessment
Services. Learn more at 👉https://wilsoncgrp.com/vulnerability-assessment.

09/28/2023

Wilson Consulting Group is proud to announce that it achieves StateRAMP Assessor accreditation. As a certified 3PAO (third-party assessment organization), we are approved and dedicated to assisting cloud service providers ( ) in meeting the security standards required by state and local governments.

Our StateRAMP 3PAO authorization follows its FedRAMP-accredited designation as a 3PAO from the American Association for Laboratory Accreditation ( ).

Achieve and maintain your StateRAMP security status with a reliable and experienced partner today.

👀 Contact us at [email protected]

09/15/2023

Per Federal Information Security Modernization Act ( ) guidance released in December 2022, are required to have at least 80% of their information technology equipment reporting through the Cybersecurity and Infrastructure Agency’s Continuous Diagnostic and Mitigation (CDM) program by no later than Sept. 30.

Are you compliant with FISMA? is mandatory for all federal agencies and any private businesses that the federal government contracts to deliver goods or services.

Obtain and maintain your FISMA with WCG’s assistance. Contact us today 👉: https://wilsoncgrp.com/federal-information-security-management-act-fisma-assessment

09/12/2023

Are you aware of FedRAMP’s latest changes?

The recent transition to Rev.5 requires all Cloud Service Providers ( ) which are handling federal information and providing or seeking to provide services for federal agencies to be compliant with 800-53 Rev 5 standards.

The three baseline levels now consist of the following controls:

Low Baseline-31 additional control
Moderate Baseline-2 fewer controls
High Baseline-11 fewer controls

Now recognized as a new Threat-Based Methodology, each NIST SP 800-53 Rev. 5 control within FedRAMP’s baselines protects, detects, and/or responds to more effectively than ever before; the transition places a higher priority on considerations.

WCG is an accredited FedRAMP to conduct security assessments for CSPs seeking FedRAMP Ready and FedRAMP Provisional/Agency Authorizations. We provide consulting, readiness assessment, full assessment, and continuous monitoring services to assist your organization in pursuing FedRAMP .

Learn more: https://wilsoncgrp.com/fedramp-consulting

Want your business to be the top-listed Business in Washington D.C.?
Click here to claim your Sponsored Listing.

About Wilson Consulting Group

Wilson Consulting Group (WCG) is an innovative global cyber security consulting firm headquartered in Washington D.C., with a European office in London, England. We specialize in governance, risk, and compliance consulting services, providing our clients with strategic guidance, technical solutions, and business advice to best serve their individual needs.

Wilson Consulting Group (WCG) is an innovative global cyber security consulting firm headquartered in Washington D.C., with a European office in London, England.

We specialize in governance, risk, and compliance consulting services, providing our clients with strategic guidance, technical solutions, and business advice to best serve their individual needs.

If you need the cyber security for your company Contact Us

Videos (show all)

FedRAMP security requirements are mandatory for all US federal agencies and all Cloud Service Providers (CSPs) that hold...
Wilson Consulting Group - Happy Columbus Day!
Systems and Organization Controls 2, or #SOC2, is a security framework consisting of compliance requirements that deal w...
#BritishAirways was recently levied fines of 211.7M euros (the largest fine to date) for a #vulnerability in their websi...
WCG-Reducing risks and protect your valuable privacy
WCG_short video_Application_Security
WCG_short video_About Us v01
#GDPR
GDPR

Telephone

Address


800 Maine Avenue SW, Suite 200
Washington D.C., DC
20024

Opening Hours

Monday 9am - 5:30pm
Tuesday 9am - 5:30pm
Wednesday 9am - 5:30pm
Thursday 9am - 5:30pm
Friday 9am - 5:30pm

Other Consulting Agencies in Washington D.C. (show all)
BBU Enterprise BBU Enterprise
Washington D.C.

"Pioneering The Flow of Entertainment"

SEME - The Sports Events Marketing Experience SEME - The Sports Events Marketing Experience
Washington D.C.

Register at: www.TheSEME.com for the annual Sports Events Marketing Experience April 3-4, 2020

LAPR Group LAPR Group
Washington D.C.

Need To Make An Impact With Your Next Promotional or PR Campaign? Let LAPR Show You RESULTS!

Stokefire Stokefire
Washington D.C.

Organizational Assessments and root-cause solutions for established organizations in transition.

EATS Good Media EATS Good Media
Washington D.C.

Strategic Marketing + Media...Full Service or A la Carte

BluOpal BluOpal
Washington D.C., 50265

BluOpal Consulting guides organizations to achieve results by awakening the power in people.

Witeck Communications, Inc. Witeck Communications, Inc.
2120 L Street NW, Ste 850
Washington D.C., 20037

Witeck Communications is one of the nation’s premier strategic marketing communications and public relations firms with trusted expertise over nearly two decades in researched know...

Psychologically Healthy Workplace Program Psychologically Healthy Workplace Program
750 1st Street NE
Washington D.C., 20002

The Psychologically Healthy Workplace Program (PHWP) is a public education initiative designed to engage the employer community and increase public awareness of the benefits psycho...

Blueprint for Style Blueprint for Style
Brookland
Washington D.C., 20017

B4S works with professionals to curate a closet that aligns their brand and Visual Resume™!

Measuring Success, LLC Measuring Success, LLC
1629 K Street
Washington D.C., 20006

We leverage data tools, quantitative analytics, consulting and training to help independent schools,

the Hill Group the Hill Group
1017 12th Street, NW
Washington D.C., 20005

DISC Development LLC DISC Development LLC
Washington D.C.

DISC Development was founded in 2005 as a LLC engaged in delivery of management, research, marketing, media, NGOs capacity building and online solutions