Technical Expertise

We take our technical skills seriously
We pride ourselves on staying current with new trends, tools, technologies, platforms, and information security vulnerabilities.
We’re just as comfortable making and breaking software and hardware to push the boundaries of information security, information and data management, and knowledge management as we are being on-site helping our clients.
We’re often found writing scripts to streamline workflows, building tools to make processes more efficient, and developing new ways to make systems more resilient. We’re always up for the challenge of researching cybersecurity threats, conducting penetration tests, or tracking and battling malware.
Recent projects include:
- Developing a custom chatbot for a knowledge base
- Developing custom tools for on-the-fly language translation within an intranet
- Developing an “ingest app” to populate Salesforce and SharePoint knowledge bases
- Using the FireOak Acorn to remotely diagnose a client’s network outage
Experts in Today’s Major Platforms
Our team includes technical experts in all of today’s major enterprise platforms — Office 365, Amazon Web Services (AWS), Salesforce, and G Suite.
Members of our consulting team hold Salesforce, AWS, Microsoft, Red Hat, and Cisco certifications, among others.
FireOak Strategies is a Salesforce Registered Consulting Partner.

Recent Articles
News and insight from the FireOak team about managing, securing, and sharing knowledge
-
LastPass Authenticator Security Evaluation
In March of 2016, LastPass announced the availability of LastPass Authenticator, an app that provides push-based multi-factor authentication (MFA) for users of their password management service.
-
LastPass Authenticator Security Review: Part 2
Part 2 of our in-depth review of the LastPass Authenticator.
-
Ten Minute Knowledge Sharing
This 10-minute knowledge sharing exercise can be a simple, fast, and effective way to get started with knowledge management, without draining resources.
-
LastPass Authenticator Security Review: Part 1
We took an in-depth look at the architecture, communications, and security of the LastPass Authenticator app in our lab in order to better understand the technology being used and whether or not the security is adequate for protecting a high-value asset such as LastPass.
-
Knowledge, Information, and Data
What is Knowledge? Information? Data? While we may talk about them interchangeably, there are important differences between the three concepts.
-
Data Classification and Knowledge Management: Protecting Data
Part 3 of our series about data classification policies.
-
Data Classification and Knowledge Management: Categories of Data
Part 2 in our series about data classification policies.
-
Data Classification and Knowledge Management: Roles and Responsibilities
Part 1 of our series on data classification policies.
-
Announcing FireOak Strategies
Clobridge Consulting is becoming FireOak Strategies, LLC!
-
Let’s Encrypt the Internet: From HTTP to HTTPS
Information Today has published a new article by Abby Clobridge about Let’s Encrypt, an important milestone in internet encryption.