Phoenix Consultants Group is a software development firm specializing in creating data-driven software applications and websites.  Phoenix creates superior custom software products that deliver the tools necessary for business managers and owners to make informed decisions and manage their important data.

To learn more about the services we offer and our extensive client portfolio visit the tabs below.

Cyber war

America at War- Part 1: Most people think that to be in a war we need to have soldiers on the ground, firing at an enemy across some line where we trade missiles, bombs, rockets, mortars and gun fire in the hopes of forcing the other side to either surrender or die in the attempt.  [...]

Advantages of Microsoft Access

An Expert Look At The Advantages Of Microsoft Access There was a day when Microsoft Access was incredibly frustrating. I spent days looking around the software in an attempt to find the functions and flexibility that I needed. Access was the only affordable solution for me, but it didn’t do everything I needed it to [...]

Evolution of Databases

Access Database Programming – Development for Growth   Business is driven by the information that we have and database programming allows for that information to flow properly. The processes that our businesses follow must provide feedback at every stage in order to improve the outcomes for our clients. Increasingly, we are realizing that raw data [...]


Мoѕt companies uѕе ѕоmе form оf data storage. It іѕ common tо stоrе large amounts оn information іn а database system, and staff should hаvе good Microsoft access database training in order tо meet the needs оf the company. Тherе аre different types of databases, but essentially іt comes down tо the right ѕуstеm fоr [...]

Web Based Application Development

Many companies are unfamiliar with what a web application is compared to a normal iPhone or Android application. A web application is simply a website that has been optimized to function much like how a regular app on a phone would function. With a web based application development company you can create an application that [...]

The internet over the years has experienced tremendous changes. Not long ago, <BLINK> tags used to be the toast of the internet language. Today, the internet has evolved dramatically and one area that has been most affected is the area of web application development. The need for web applications has risen with many companies around [...]


Need for ERP Software ERP software is designed to enhance both internal and external customer relationships and collaborations by mechanizing activities that define work processes, smartening business processes and enhancing user productivity.  Today’s companies often look at ERP software to categorize and repair inefficiencies in an organizational process or whenever there is a rise in the [...]


The complete software development process, or Software Development Life Cycle, is the process of creating or changing software systems and the methodologies that are used to achieve the changes.  In the world of software engineering, SDLC underlines various types of development methodologies. These methodologies combine together to form a skeleton of planning, control and execution, which is globally known [...]


Having multiple sources of data can lead to various formats of information.  These sources can be from third party servers, direct data input from various sources, or automatically generated information input from internal and external networks.  As the recipient and user of this information, you may require the ability to use this information in a [...]

inventory management

The world is progressing into more modern and technologically based mediums every day.  We are gradually releasing our hold on paper based data management and moving forward with more precise and accurate computer based methods.  Inventory Management Software refers to computer programs designed specifically to assist you with controlling and cataloging your inventory.  This software group helps [...]

  Yesterday’s repeal of the FCC landmark Internet privacy protections law has opened a chasm that will now expose the privacy of every person on the web.  As the article in the Washington Post stated today –[The removal of the law] “freed Internet service providers such as Verizon, AT&T and Comcast of protections approved just [...]

As the holiday season has ramped up, so has the online hacking/phishing of accounts that are connected to your bank accounts, credit cards and debit cards.  Reports of the latest phishing for Amazon and Paypal are just two of the ongoing attempts that are used to steal money from your account.  Here are a few [...]

I recently was reminded through the movie Snowden of the critical need to cover your webcams.  Most people leave their cameras open and running on their computers, laptops and phones.  In today’s world, this gives the perfect opening for a hacker or person who does not have your best interests at heart to see and [...]

CryptoLocker (Trojan:Win32/Crilock.A) by Fabian Wosar » Tue Sep 10, 2013 9:29 am Hi everyone,Looks like there has been a new crypto malware on the loose for the past 2 – 3 days. The malware is referred to by its author as “CryptoLocker”. Microsoft adopted the name Crilock. Sample is attached. Here are a few notes that I [...]

Phoenix Consultants Group

For Immediate Release – URGENT PRESS RELEASE Contact Person: ALLISON WOOLBERT,  CEO Email: There is a new form of a virus going around called RANSOMWARE.  One of the Ransomwares is being called CryptoLocker(Trojan: Win32/Crilock.A) among other names  and comes in most cases through email as if you are receiving an INVOICE or a PAYMENT [...]

Microsoft Access Tips

Your 5 Keys to Easy Microsoft Access Database Editing  Microsoft Access has advanced massively over the last 20 years. It is now a rich application that provides excellent out-of-the-box functionality. It is now compatible with other applications and can be used to create a productive and functional solution that can meet all your business needs. Often, [...]