It Consulting and Business Technology Solutions
Safeguard Your Technology Systems and IT Assets
Receive expert advice and develop comprehensive strategies that support and protect your business technologically.

Secure Technology Systems and Protect Your Business Long-Term
Our auditors, assurance professionals, and cybersecurity experts provide you with guidance your business requires.
Pinion Technology Core (PTC) is a dedicated arm of certified IT professionals that provide technology assessments, solutions, implementation, and management.
Certified IT professionals for technology management
Specialized in healthcare, accounting, and medium-sized business requirements.
Cybersecurity risk assessment
Give your business what it deserves: protection from cyber threats.
Information security program development
Improve your business’ security by identifying information assets and developing and implementing policies and procedures.
SOC 1 & 2, Type 1 & 2 examinations
Explore and test the functionality of your service-based business’ controls.
“If your business isn’t positioned to identify and react quickly to a cyberattack, it can be a devastating loss.
Especially for the small- to medium-size businesses that don’t have any strategies in place.”
-Melissa DeDonder, Director of External IT Consulting at Pinion
Expertise Where and When You Need It
Review & Assessments
- IT audit and assurance advisory services
- IT system assessment and strategy
- Cybersecurity risk assessment
- Secure banking assessment
- Vulnerability assessments (web application, external/internal network)
- Firewall and active directory (AD) review
- SOC 1 & 2, Type 1 & 2 assessments
Implementation & Response
- Enterprise governance, compliance & risk services
- Enterprise resource planning
- Digital forensics and incident response
- System characterization/network diagram
- Creation and implementation of information security program
- Ransomware emulation
- Security scorecard – external digital footprint
Ongoing Service or Partnership
- Fraction CISO
- Business Continuity Planning and Testing
- Disaster Recovery Testing
- Security Awareness Implementation and Education
- Security Framework (NIST CSF, ISO 27001, PCI, HIPAA and more)
- Compliance and Implementation
- SOC 1 and 2 Readiness and Implementation
- Managed Services – IT security and help desk support
Is my confidential customer and company information secure from cyber or fraud attacks?



Staying on Top of Data Security & Protection
Did you know that ransomware attacks have increased by over 97% in the past two years, and it is estimated that one business falls victim to this type of attack every 11 seconds?
The list of IT and business technology-related concerns continues to grow at a quick pace. Think ransomware, third-party and supply chain attacks, phishing, malware exploits, DDoS attacks, and more.
All businesses, regardless of the size or industry, can be affected by these common risks. At a minimum, all businesses should adhere to industry best practices and maintain fundamental cyber hygiene. We will help identify and protect your data and your customer’s data with standardized installation, patching, and monitoring, detection and response procedures.
Risk Identification
Identify and quantify the risk level associated with IT assets by completing and maintaining a written risk assessment.
Security Breach Protection
Create a plan to mitigate and protect against those risks, test and apply critical patches, educate employees, and enforce password guidelines.
Threat Detection
Establish a baseline for normal operations and monitor frequently to discover and shut down potential threats before a crisis strikes.
Business Continuity Program
Have an incident response plan in place to quickly mitigate identified incidents, have a business continuity in place to protect business, customers, and employees and have a disaster recovery plan in place to get operations running back to normal.
Business Technology Insights
Today, 25% of all crime is cyber-related. With the list of IT concerns ever growing and becoming more sophisticated with each day, an unprotected business
- Financial Institutions
In light of the recent cyberattack that shut down Dole’s North American production, businesses are reminded once again of the importance of cybersecurity and keeping
- Animal Protein, Biofuels, Commodity Crops, Construction, Equipment Dealers, Financial Institutions, Food And Beverage, Manufacturing, Permanent & Specialty Crops
Wherever you were on your technology journey at the start of 2020, COVID-19 has likely caused dramatic changes in your business. Many organizations were pleased
- Financial Institutions
Normally, when organizations discuss cybersecurity, all heads turn to IT for management of this issue. But Cyber Risks programs are no longer the sole responsibility
- IT Consulting
Discover what Pinion can do for you:
Expertise Wherever You Need It
A holistic approach to optimal results.
Pinion is dedicated to your business and your success. We navigate the barriers, complexities, and business challenges that stand in your way, cultivating your long-term growth and helping you achieve new opportunities.
Accounting & Back Office Solutions
Capture accurate accounting data and advisory and alleviate compliance and back office challenges so that you can tend to what matters most.
Tax Compliance & Strategy
Specialists in understanding market challenges, tax law, and tax compliance needs.
Food & Ag Consulting
Our ag-focused advisors take a holistic view of your business to forecast and capture opportunities, mitigate challenges, & drive your food & ag business forward.
Succession Planning
Navigate tough business decisions, family discussions, and entity transitions. Expert estate and gift tax knowledge, trust guidance, long-term goal setting and risk management.
Financial Strategy
Strategic analysis and guidance to navigate transaction deals, satisfy stakeholder needs, and make long-term decisions.
Sustainability
Sustainability tools, solutions, and expert consulting for the food value chain. Customized to meet your sustainability goals.
- Develop a program and data plan
- Measure performance
- Program targets and execution
- GHG accounting
- Scope 1, 2, 3 reporting
- Risk assessments
Do You Know Your Risk Vulnerability?
Our team works with you to identify assets and pain points, develop plans and systems to protect and monitor, and respond, all with the goal of protecting what matters most to you — your business.
Speak to Melissa
Melissa DeDonder, Advisor – Director of External IT Consulting