Archive

Blog search

Archive: December 2020

M-19-21 Memorandum and What It Is

Posted on December 09, 2020

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More


photo

Many agencies want cloud computing for their local government operations. Because of the versatility of cloud servers and the way they dovetail with analytics-driven internal processes, many are utilizing this hardware for their business. However, it is not always easy for federal agencies to find the kinds of services that they need. Looking for a provider that is able to give an organization the attention and straightforward contract that is necessary to create a successful business relationship is difficult, and requires as much legal knowledge as it does technical. In order to solve this problem, many federal agencies will have to hunt to find the cloud providers that can give them the tools they need.  Read More

photo

The biggest threat to security may come from within

Posted on February 24, 2015 0 comments
Category: Cybersecurity

Federal agencies are always worried about the security of their systems. They should be. The amount of organizations that have been hit by cybercrime has only gone up in recent years, and it will likely take even more public knowledge of the problems out there for more groups to take it seriously. Thankfully, there are some government IT solutions for those that want to defend their information while still being able to proceed as normal. There are many risks out there, but vigilance can allow organizations to limit their exposure to the most deadly attacks over time. In the end, it is more about damage prevention than actually blocking attacks.  Read More

photo

Utilizing big data may be an attractive option for many companies, but recent cybersecurity breaches have the public growing cold on the idea. Although there are many potential benefits from the use of these types of initiatives – including a greater understanding of public health, genetic risks in the development of chronic illness, and the obesity epidemic – big data use may become hard to sell to citizens. Government technology solutions unfortunately must rely on the public accepting these projects in order for any headway to be made. Many local agencies may want to use these new programs, but will they be able convince people of their safety?  Read More

photo

Risk analysis for local government agencies will soon become a little bit easier. A recent announcement from a senior Obama administration official said that the U.S. is forming a new cybersecurity agency. This federal group, known as the Cyber Threat Intelligence Integration Center, or CTIIC, will ‘connect the dots’ between different threats and agencies, to allow organizations to solve threats quickly. This group is also being designed to act as a method for companies to share information on possible threats without necessarily turning over civilian data to other agencies, in accordance with the wishes of various Internet freedom watchdog groups.  Read More

photo

Ultimately, the goal of any group’s security department is to keep their data from being compromised. This isn’t necessarily the same thing as preventing breaches – intrusions occur on all servers. Instead, the issue that government organizations need to be aware of is how to limit damage when an attack occurs. The best defense here does not consist of creating impenetrable servers, but storing information in such a way that its theft does as little damage as possible. To this end, encryption, strong security policies about data storage and good archival policies can protect a federal agency’s information better than anything else.  Read More

photo

The best defense against cyberattacks is up-to-date security

Posted on February 09, 2015 0 comments
Category: Cybersecurity

Federal organizations are caught between a rock and a hard place with cybersecurity. On the one hand, they are increasingly vulnerable to different types of attacks coming in from online criminals that attempt to steal information off of their servers. On the other hand, it is increasingly difficult for them to keep up with the different ways they can be hit. Because organizations have a limited IT budget, it is impossible for them to stretch it out long enough to use every single security system out there. This leaves these groups vulnerable to being attacked.  Read More

photo

Cybersecurity can only be achieved by pooling resources

Posted on February 07, 2015 0 comments
Category: Cybersecurity

The outlook on cybersecurity is bleak. Although it isn’t necessarily obvious from looking at the amount of popular coverage it gets, criminals are overwhelmingly winning the cybersecurity war. This is due to a number of complex factors, but primarily it is because individual businesses don’t have an effective means of defending themselves. Up-to-date and secure data storage is so expensive that most companies don’t have the means to hide it properly from criminals. However, nearly every business and governmental agencies have information that needs to be protect.  Read More

photo

Federal IT services are frequently dealing with a large amount of security concerns. After all, it is the nature and job of these types of individuals to have to stor data that could be very damaging if accessed by hackers. Yet, cybersecurity concerns have grown more heated than ever. Thanks to recent high-profile hacks on major companies, the public consciousness about cybersecurity has been roused.  Read More

photo

Training may be necessary to keep servers secure

Posted on February 01, 2015 0 comments
Category: Cybersecurity

Organized crime, not simple ego and games played by children, is the result of modern hacks on most companies. With this perspective. it is necessary for agencies to be sure to protect themselves and their partners by safeguarding their data. It is, unfortunately, very easy to wind up acccruing hundreds of thousands of dollars and damages due to the havoc that can be wreaked by someone with full access to a given network. It is therefore incredibly important that users and vendors take care to protect themselves and their data by making use of good security strategies.  Read More