Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers and everyone in between.

Best Practices for Managing User Access In NetSuite

NetSuite empowers businesses to establish the right controls to meet risk objectives, then monitor and report on the effectiveness of those controls. In this article, we’ll go over best practices around role management, audit trails, and establishing...
Read The Full Blog
Filter Blog Posts By Topic

The Ultimate Prep Guide for Planning and Budgeting Season

Budgeting season is one of the most important times of the year for any organization. Colleagues come together to review the previous year’s financial performance, set goals for the upcoming year and allocate resources to achieve those goals.
Read The Full Blog

4 Steps to Strategically Reduce Expenses Using AI Analytics

Cost optimization has become a focal point for many companies in the past few years as they look to stay competitive and resilient while dealing with tightening customer budgets and more stringent access to capital. This strategic practice focuses on...
Read The Full Blog

Features Included In Sage 300 2025 and Year-End Processing Tips

Sage 300 2025 is now available! Below, we’ll look at some of the top new features in the latest release that include updates to core functions that improve user experience, plus ways to improve your year-end close in Sage 300.
Read The Full Blog

6 Steps to Build an AI-Ready Finance Team

By now, CFOs have heard that artificial intelligence (AI) promises to shake up the work finance professionals do every day by automating many tasks and providing new insights. Embracing AI will require finance teams to choose from myriad offerings to...
Read The Full Blog

Don’t Become a Cyber Security Horror Story This October

It’s October again, which means it’s Cyber Security Awareness Month — and the cyber security landscape couldn’t be scarier for your small business. Cyber insurance is less protective and more expensive than it used to be, your biggest threat to security...
Read The Full Blog
1 2 3 4 5

Subscribe And Get The Latest Tech And Cyber News