From offices in Boise, Post Falls, Twin Falls, and Pocatello, TechHelp Specialists help Idaho manufacturers, food processors and entrepreneurs improve their competitiveness through continuous product and process innovation.

Uncategorized

Lean Six Sigma Green Belt Course – Treasure Valley 2026

Lean Six Sigma Green Belt Course – Treasure Valley 2026 April 8 & 23, May 6 & 20 SBDC Nampa Business Accelerator TechHelp and the Idaho Manufacturing Alliance will offer a Public Lean Six Sigma Green Belt Course at the SBDC Accelerator in Nampa with full-day sessions on 4/8, 4/23, 5/6, and 5/20 of 2026. Lean Six Sigma (LSS) is a well-known approach for achieving operational excellence that does more than simply improve production processes. LSS combines the process improvement benefits of Lean with the statistical process control (SPC) benefits of Six Sigma. It takes advantage of the “value-added” focus of Lean while maintaining the statistical rigors of Six Sigma. This series will include four full-day training sessions with two weeks between sessions for participants to complete project work that is an essential part of the LSSGB program. This popular course will fill fast, so save your seat ASAP. https://techhelp.regfox.com/2-8627lssgbspring2026

Uncategorized

Cybersecurity Maturity Model Certification (CMMC) Solutions

The Cybersecurity Maturity Model Certification (CMMC) program is aligned with the U.S. Department of Defense (DoD) information security requirements for Defense Industrial Base (DIB) partners. If your organization doesn’t meet minimum CMMC-level requirements, you may be unable to bid on certain grants and contracts.

TechHelp in partnership with the Institute for Pervasive Cybersecurity (IPC) at Boise State is looking for a few companies to complete a CMMC level 1 or level 2 assessment over the next 6 months. A CMMC assessment starts your company on the path to certification in cyber security which could put you on the path to seeking grant funding for further certification. It raises awareness of critical steps to implement foundational cybersecurity protection needs.