Archive

Blog search

Archive: February 2015
photo

The biggest threat to security may come from within

Posted on February 24, 2015
Category: Cybersecurity

Federal agencies are always worried about the security of their systems. They should be. The amount of organizations that have been hit by cybercrime has only gone up in recent years, and it will likely take even more public knowledge of the problems out there for more groups to take it seriously. Thankfully, there are some government IT solutions for those that want to defend their information while still being able to proceed as normal. There are many risks out there, but vigilance can allow organizations to limit their exposure to the most deadly attacks over time. In the end, it is more about damage prevention than actually blocking attacks.  Read More

photo

Who stands to gain and lose from big data in the public sector?

Posted on February 21, 2015
Category: Data Center

Utilizing big data may be an attractive option for many companies, but recent cybersecurity breaches have the public growing cold on the idea. Although there are many potential benefits from the use of these types of initiatives – including a greater understanding of public health, genetic risks in the development of chronic illness, and the obesity epidemic – big data use may become hard to sell to citizens. Government technology solutions unfortunately must rely on the public accepting these projects in order for any headway to be made. Many local agencies may want to use these new programs, but will they be able convince people of their safety?  Read More

photo

New agency designed to share information on cyberthreats formed

Posted on February 10, 2015
Category: Data Center

Risk analysis for local government agencies will soon become a little bit easier. A recent announcement from a senior Obama administration official said that the U.S. is forming a new cybersecurity agency. This federal group, known as the Cyber Threat Intelligence Integration Center, or CTIIC, will ‘connect the dots’ between different threats and agencies, to allow organizations to solve threats quickly. This group is also being designed to act as a method for companies to share information on possible threats without necessarily turning over civilian data to other agencies, in accordance with the wishes of various Internet freedom watchdog groups.  Read More

photo

Recent struggles over the role of cybersecurity highlight its prominence

Posted on February 10, 2015
Category: Cybersecurity

Ultimately, the goal of any group’s security department is to keep their data from being compromised. This isn’t necessarily the same thing as preventing breaches – intrusions occur on all servers. Instead, the issue that government organizations need to be aware of is how to limit damage when an attack occurs. The best defense here does not consist of creating impenetrable servers, but storing information in such a way that its theft does as little damage as possible. To this end, encryption, strong security policies about data storage and good archival policies can protect a federal agency’s information better than anything else.  Read More

photo

The best defense against cyberattacks is up-to-date security

Posted on February 09, 2015
Category: Cybersecurity

Federal organizations are caught between a rock and a hard place with cybersecurity. On the one hand, they are increasingly vulnerable to different types of attacks coming in from online criminals that attempt to steal information off of their servers. On the other hand, it is increasingly difficult for them to keep up with the different ways they can be hit. Because organizations have a limited IT budget, it is impossible for them to stretch it out long enough to use every single security system out there. This leaves these groups vulnerable to being attacked.  Read More

photo

Cybersecurity can only be achieved by pooling resources

Posted on February 07, 2015
Category: Cybersecurity

The outlook on cybersecurity is bleak. Although it isn’t necessarily obvious from looking at the amount of popular coverage it gets, criminals are overwhelmingly winning the cybersecurity war. This is due to a number of complex factors, but primarily it is because individual businesses don’t have an effective means of defending themselves. Up-to-date and secure data storage is so expensive that most companies don’t have the means to hide it properly from criminals. However, nearly every business and governmental agencies have information that needs to be protect.  Read More

photo

Federal agencies will have large role in restructuring cybersecurity

Posted on February 01, 2015
Category: Cybersecurity

Federal IT services are frequently dealing with a large amount of security concerns. After all, it is the nature and job of these types of individuals to have to stor data that could be very damaging if accessed by hackers. Yet, cybersecurity concerns have grown more heated than ever. Thanks to recent high-profile hacks on major companies, the public consciousness about cybersecurity has been roused.  Read More

photo

Training may be necessary to keep servers secure

Posted on February 01, 2015
Category: Cybersecurity

Organized crime, not simple ego and games played by children, is the result of modern hacks on most companies. With this perspective. it is necessary for agencies to be sure to protect themselves and their partners by safeguarding their data. It is, unfortunately, very easy to wind up acccruing hundreds of thousands of dollars and damages due to the havoc that can be wreaked by someone with full access to a given network. It is therefore incredibly important that users and vendors take care to protect themselves and their data by making use of good security strategies.  Read More

photo

Can you be too secure?

Posted on February 01, 2015
Category: Cybersecurity

Agencies that are interested in protecting their data must go through a delicate balancing act. While it is important for everyone within an organization to be security conscious and aware, policies that are too limiting can quickly cause a group to lose favor and ultimately harm the functioning of the agency far more than an attack ever would. This may be why, in part, so many groups are looking for tech talent. People with expert skills can light the way for an organization to take a security path that’s sensible without being overbearing. Especially since many agencies are utilizing big data strategies in order to get the maximum value from their centers, it makes sense to find talent that can provide the security necessary to keep a company floating.  Read More

photo

Staying Secure in an Always Connected World

Posted on March 20, 2017 0 comments
Category: Internet of Things

Feds bring the constantly connected mindset from their personal lives, to work, along with new expectations. For example, the ability to take and share a photo instantly. Instant messaging. Social collaboration. And access to information – all needed/desired information – anywhere, anytime.  Read More

photo

The DCOI Journey: Simplifying Your Data Center

Posted on February 07, 2017 0 comments
Category: Data Center

Last week, the House of Representatives passed the “Energy Efficient Government Technology Act,” which will place energy efficiency standards on Federal data centers and require OMB to collaborate with agencies on plans to purchase and use energy efficient data center technologies.  Read More

photo

Investment in quality technology is aiding governments improve transparency

Posted on September 01, 2016 0 comments
Category: Technology

This past week, the town of Gallipolis, Ohio, made its financial records available to the public, the Gallipolis Daily Tribune reported. While this probably wasn't the biggest news story of 2016, it is reflective of an exciting state, and nationwide, trend.  Read More

photo

How vulnerable are US voting machines to foreign hackers?

Posted on August 10, 2016 0 comments
Category: Cybersecurity

The recent hack of Democratic National Committee computers, attributed by authorities to Russia, has many Americans worried about foreign influence swaying the upcoming presidential election.  Read More

photo

Data mapping is changing government

Posted on June 29, 2016 0 comments
Category: Data Center

Geographical information systems are evolving and so are the governments that are using them.  Read More

photo

What can artificial intelligence do for the government?

Posted on June 08, 2016 0 comments

Artificial Intelligence programs are completely changing how people view computers. Once lifeless machines, AI systems are allowing for computers to analyze information in ways once thought impossible. Such a revolutionary trend has many implications, especially within government. With that in mind, what can the modern agency get out of AI deployment?  Read More

« Previous1234567...29Next »