Archive

Blog search

Archive: June 2015
photo

Federal IT Acquisition Reform to be implemented soon

Posted on June 30, 2015
Category: Cybersecurity

In the last few weeks, whenever someone mentions the government, it has probably been in relation to cybersecurity. While things haven’t been looking very good in the wake of a data breach affecting millions of employee records stored by the Office of Personnel Management, federal CIOs are trying to change the tune. Many agencies have been trying to improve their cybersecurity efforts for some time now, but outdated requirements and insufficient funding have hampered their attempts. Now, however, change is coming as the deadline to implement the Federal IT Acquisition Reform Act draws near.  Read More

photo

A new report released by application security firm Veracode revealed this week that practically every industry failed to meetsector-specific standard security testing of Web and mobile applications being used for business processes. However, government agencies did the worst on the tests by far, with less than one-quarter of applications passing. The next worst performing industry was retail and hospitality, with 30 percent of applications in compliance with regulatory standards.  Read More

photo

In recent years the general public has seen many things that were once considered far-fetched or within the realm of fiction become reality, especially where cybersecurity is concerned. One such case is that of the increasing use of facial recognition software. Once thought to exist purely within the world of James Bond or other super spies, facial recognition software is becoming a widely used tool to help fight against fraud and cybercrime. Now the government is making facial recognition a main component in its efforts to reduce identity theft, illegal immigration and terrorism.  Read More

photo

Malware found in hotels holding Iranian nuclear talks

Posted on June 15, 2015
Category: Cybersecurity

Recent talks concerning the Iranian nuclear program appear to have hit a snag, but this time it wasn’t due to politics. Negotiations regarding the program were held in three European hotels in late May, all of which have now been identified as victims of a new cyber espionage tool known as Duqu 2.0.  Read More

photo

Electronic health records improve health care but pose security risk

Posted on June 11, 2015
Category: Cybersecurity

Technology has been responsible for a variety of innovations in health care, but one of the most impactful has been electronic health records. With EHR, patients don’t have to continuously fill out medical information forms when they’re at the doctor because their health data is available through hospital databases to any doctor that needs it.  Read More

photo

As people enjoyed the warmth of summer weather this week, it was revealed that cybercriminals were also turning up the heat by successfully infiltrating federal networks and compromising government employee data. The Obama administration announced in early June that one of the largest breaches of federal employee information had been carried out, with at least 4 million current and former workers impacted. Officials investigating the breach believe the attack originated with malicious actors in China.  Read More

Mobile applications or responsive websites?

Posted on June 01, 2015

Recent years have seen rapid changes in how everyday net users consume media and handle online matters. Increasingly, they are no longer confined to sitting in front of a computer with the use of just a keyboard and mouse. Smartphones and tablets have improved dramatically in terms usability since mainstream adoption began roughly eight years ago. Statistics from Statista have shown a downward trend for the global shipment of computers and numbers will continue to fall at least until 2017. Even an early 2015 article from Wired magazine predicted in less than two years, the smartphone will most likely be the only computer for a majority of users.  Read More



M-19-21 Memorandum and What It Is

Posted on December 09, 2020 0 comments

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More

Is Your IT Infrastructure Ready to Support Your Data Demands?

Posted on November 13, 2020 0 comments

It is said that data runs today's world, and we could argue that it is not an exaggerated statement. From important business decisions to process optimization, everything today is data driven. Data has become a necessity of life. Everyone is pursuing increasing volumes of data, but very few understand that this quest for more data must be closely tied to effective, state-of-the-art datacenters. With the growing demand for data, there needs to be an underlying infrastructure that can host queries, process inputs, and feed relevant information, on pace with modern needs. Prevalent IT infrastructures are insufficient; therefore, to make sure that super-fast data communication is done with negligible latency, the establishment of hyper-converged infrastructure is inevitable.  Read More

photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020 0 comments
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More

photo

What Are The Implications of 5G Technology?

Posted on August 26, 2020 0 comments
Category: Cloud Computing

The term 5G simply implies the 5th generation of mobile network technology. And it’s fast, with a theoretical upper limit 10 Gigabits per second. The potential uses for this new technology are just beginning to be understood, possibilities are endless!  Read More

photo

Data Protection Services

Posted on January 15, 2019 0 comments
Category: Cybersecurity

It is more important than ever for organizations to protect their data and address compliance, without disrupting employee and company productivity. With GDPR, the California Privacy Act, and the Data Protection Act of 2018, organizations now have regulations that mandate how their data is secured. Every organization must take a serious look at how they are protecting their data and align their data protection and compliance strategy with government mandates.  Read More

photo

RSA Conference 2019

Posted on January 08, 2019 0 comments
Category: Cybersecurity

As cyber attacks have become an ever present occurrence many agencies are still not prepared to prevent all threats. UNICOM Government together with Dell EMC will be showcasing our joint security solution at RSA 2019 that encompasses network and data center security solutions protect high value data and data center resources with threat defense, highly secure virtualization, segmentation and policy control.  Read More

photo

IT Modernization in the Trump Age

Posted on April 18, 2017 0 comments
Category: Cybersecurity

The Federal government is losing billions of dollars each year funding legacy systems. A report from IDC Government Insights shows that some agencies allocate upwards of 90 percent of their IT budgets to operations and maintenance. And, in a recent MeriTalk article, the Government Accountability Office’s Head Gene Dodaro noted legacy IT systems pose a serious obstacle to cybersecurity best practices. The answer is clear: Modernization.  Read More

photo

Staying Secure in an Always Connected World

Posted on March 20, 2017 0 comments
Category: Internet of Things

Feds bring the constantly connected mindset from their personal lives, to work, along with new expectations. For example, the ability to take and share a photo instantly. Instant messaging. Social collaboration. And access to information – all needed/desired information – anywhere, anytime.  Read More

photo

The DCOI Journey: Simplifying Your Data Center

Posted on February 07, 2017 0 comments
Category: Data Center

Last week, the House of Representatives passed the “Energy Efficient Government Technology Act,” which will place energy efficiency standards on Federal data centers and require OMB to collaborate with agencies on plans to purchase and use energy efficient data center technologies.  Read More

« Previous123456...30Next »