How to Help Employees Spot Phishing Emails

Posted by Stephen Palamara, TCC Director of Business Development

Phishing emails are one of the biggest ways that malware is spread, and it is important that employees understand how to spot phishing emails. A recent study found that organizations in the healthcare industry are most susceptible to phishing attempts, with one in every seven simulated emails being clicked on. This study discussed that the findings in the healthcare industry are consistent with other industries, where click rates range from 13 – 49%.

The study suggested that companies can lower these percentages by running phishing simulation campaigns to increase employee education and awareness.

The study states, “Phishing is an easily deployable attack strategy, largely because email is an easy access point to hospital employees, many of whom have credentials for several internal information systems (eg, electronic health records). In our experience, email addresses are easy to ascertain, either from published resources (journal articles, public websites and social media) or through guessing. In addition, emails are frequently opened, regardless of sender.”

As phishing email scams evolve, it may be beneficial to regularly provide training and education to employees to keep this information top of mind.

To learn more about TCC’s Security Services please visit our website



TCC Seeks a Business Analyst

Posted by Kelly Grant, TCC Senior Technical Recruiter

The Business Analyst I translates detailed business needs into application software requirements. The primary focus is gathering and documenting business requirements, as well as writing technical requirements. Business Analysts acts as a liaison with users of the software to address questions/issues.  They determine specific business application software requirements to address business needs and work with programming staff to ensure requirements are incorporated into system design and testing.

• Reviews, analyzes, and evaluates business systems and user needs.
• Documents requirements, defines scope and objectives, and formulates systems to parallel overall business strategies.
• Proactively communicate and collaborate with external and internal customers to analyze information needs and functional requirements
• Deliver the following as needed:
o Eliciting and writing software requirements.
o Requirements organization.
o Translating and simplifying requirements for technical and non-technical staff.
o Requirements management and communication.
o Requirements analysis
• Assist in developing test scripts, use cases and testing.
• System and user documentation.
• Assist in development of design documents
• Adhere to Service Delivery Life Cycle processes
• Template and/or business process development, as needed
• Management of multiple initiatives and projects
• Reviewing material and assisting with sales presentations

• BA/BS in Computer Science, Information Systems, Business Administration or other related field or equivalent experience
• Experience with Microsoft Suite
• Minimum of 3 years of experience with business analysis that includes writing business requirements
• Reference manual content in compliance with the life cycle methodology
• Experience in the development of application specifications and flowcharts

Equal Opportunity Employer, including disabled and veterans.

To apply for this position please visit our website


Cybersecurity Maturity Model Certification (CMMC) for Defense Contractors Being Implemented by DoD. Is Your Company Ready to be Audited?

Posted by Stephen Palamara, TCC Director of Business Development

Recently, the Department of Defense announced that it will soon unveil a new cybersecurity standard and certification for defense contractors, called the “Cybersecurity Maturity Model Certification” (CMMC). This program will mandate cybersecurity audits and certifications for defense contractors.

At the 2019 Federal Acquisition Conference Presented by PSC on June 13, 2019, Katie Arrington, Special Assistant to the Assistant Secretary of Defense for Acquisition for Cyber, Office of the Under Secretary of Acquisition and Sustainment, gave a presentation titled “Securing the Supply Chain”. The full PowerPoint presentation can be viewed here

In this presentation, Ms. Arrington announced that all DoD contractors that interact with Controlled Unclassified Information (CUI) must comply with 110 cybersecurity best practices as outlined in the National Institute of Standards and Technology (NIST) Special Publication 800-171. Currently, contractors are required to self-certify that they meet the security requirements, but with the implementation of CMMC, it will no longer be possible to self-certify compliance. The CMMC initiative requires all contractor information systems to be certified as compliant by an independent auditor.

The details of CMMC are still being finalized, however the DoD stated that the levels within CMMC will range from basic cyber hygiene to “state-of-the-art,” and will capture security control and the institutionalization of processes. It is anticipated that implementation will begin over the next year.

Contractors can take steps now to reach compliance with NIST 800-171 and prepare for the certification audit. Preparation includes completing an assessment of cybersecurity compliance, a System Security Plan (SSP), a Plan of Action and Milestones (PoAM), and an Incident Response Plan (IRP).

To find out more about TCC’s Security Services, including NIST 800-171 and NIST 800-53 Gap & Remediation Services, please visit our website, or contact me via email at



TCC Seeks a Software Developer II

Posted by Kelly Grant, TCC Senior Technical Recruiter

The Software Developer will be assigned to an internal software development team working on TCC’s mobile workforce productivity application. Candidate will work within the TCC HQ in Indianapolis under the direction of TCC Project Manager.

• Deploy software in a well-planned manner with complete coordination with all end users
• Consistently meet time lines and maintain awareness of schedules
• Interpret business technical and functional requirements and design solutions to meet those requirements
• Work effectively in a team environment and balance individually assigned work
• Perform modifications to complex, multi-user systems
• Work independently and be customer service oriented

• Associate’s Degree in Computer Science or a comparable degree or equivalent work/school experience.
• 5+ years’ experience participating in collaborative development environment preferred.
• Extensive experience with Microsoft based technologies:
o C# and .NET technologies
o LINQ, Entity Framework, REST Web API
o WPF – Desired
o Microsoft SQL Server, Stored Procedures
o Visual Studio and Visual Studio Code
o Team Foundation Server, TFS User Stories – Desired
• Able to automate routine maintenance and tasks via scripting languages
• Experience with multi-tier application design and development and knowledge of design patterns
• Unit testing and integration
• Understanding of distributed systems and data structures, both in design and implantation.
• Excellent written and verbal communication skills

• Medical, Dental, Vision Insurance
• Employer-funded Health Reimbursement Arrangement (HRA)
• Company sponsored 401k
• Paid Time Off

To apply to this position please visit our website

About TCC
Founded in 1996 in Indianapolis, IN, The Consultants Consortium (TCC) is an innovative solutions provider committed to designing and delivering high-value, cost-effective IT consulting services and application technology solutions for both the private and public sectors. With a team of more than 250 IT and business professionals, TCC serves clients nationwide, from state and federal government agencies to commercial sector customers. TCC is committed to providing the most cutting edge solutions, and with that, ensures they stay up-to-date on crucial certifications and affiliations. Among these are the highly accredited Microsoft Certifications.

At TCC, we know that having a strong company culture is paramount in sustaining the success and stability of the company, especially within the information technology industry. That’s why we place our focus on the people who make our success possible: our employees, partners and clients. We strive to create an environment that preserves and fosters growth while still promoting the DNA of our company.

Our core values:
• Building strong, reliable relationships with our employees, our partners and our clients
• Upholding integrity, honesty and respect
• Supporting our local community
• Encouraging continued education and development

Accessibility: If you need an accommodation as part of the employment process
please contact Human Resources at Email:

Equal Opportunity Employer, including disabled and veterans.