Archive

Blog search

Archive: December 2020

M-19-21 Memorandum and What It Is

Posted on December 09, 2020

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More


photo

Can you be too secure?

Posted on February 01, 2015 0 comments
Category: Cybersecurity

Agencies that are interested in protecting their data must go through a delicate balancing act. While it is important for everyone within an organization to be security conscious and aware, policies that are too limiting can quickly cause a group to lose favor and ultimately harm the functioning of the agency far more than an attack ever would. This may be why, in part, so many groups are looking for tech talent. People with expert skills can light the way for an organization to take a security path that’s sensible without being overbearing. Especially since many agencies are utilizing big data strategies in order to get the maximum value from their centers, it makes sense to find talent that can provide the security necessary to keep a company floating.  Read More

photo

At this point, everyone understands the risk that agencies face in terms of cyberattacks. There are simply so many different kinds of threats organizations face that preparing to take on all of them is a massive undertaking. Despite this, big data strategies for local government offices are necessary to improve the quality of civil services for citizens. What this means is that local entities need to be able to better protect the servers they have housing their important data. For citizens, officials and professionals alike, security has become even more serious. The issue now is not whether or not groups should develop their own ways to defend their servers, but how their troves of data should be defended. With serious consideration going toward both the use of older types of protection like an Antivirus program, and modern-day methods of detection like endpoint threat response software, it is likely that agencies will see their servers increasingly layered by barricades against attacks.  Read More

photo

Security reforms are necessary, supported and ready to go

Posted on January 20, 2015 0 comments
Category: Cybersecurity

U.S. organizations are in a current state of security crisis. What has long simmered underneath the public’s radar has now emerged as major cybersecurity problems that people are beginning to realize are endemic to the way things are done. Information is connected to the point that everyone has the potential to have their data compromised, and this means that agencies must act to protect people’s security. Government agencies, specifically, need to pay attention to the rising standards that must be met in order to keep not only their own data safe, but the information that they process as well. The political will is currently there, across the board, for broader security standards for both the private and public sector, and it is likely that cybersecurity bills will pass during the upcoming House and Senate sessions.  Read More

Many organizations have become well-acquainted with the disaster scenarios that present themselves when they are hacked. The series of high profile attacks made on companies, agencies and even individuals by hackers and those who seek to disclose private information have left everyone a little bit more aware of security. What this means for the average institution is that it is no longer enough to get by with outdated methods of security.  Read More

photo

While this is hard to hear for many agencies, data breaches are inevitable. Information kept on servers that are connected in any way to the Internet are inherently insecure, and there is little to nothing that can be done in order to prevent them from being broken into. Security at this point should not be measured in terms of “safe” versus “unsafe” but “likely to be hacked” and “unlikely to be hacked.”  Read More

Cybersecurity continues to be a major topic for all federal agencies. Although many agencies have been working on their defensive systems for avoiding the threat of potential criminal or terrorist attacks on their servers, there is still much work to be done. A recent study by the Obama administration has found that most agencies have fallen short of guidelines put in place over recent years, even though these agencies have grown more eco-friendly. For instance, the cybersecurity Coss-agency priority goal was 95 percent for continuous monitoring, and agencies only managed to achieve 92 percent. Government cloud services could specifically use strong monitoring software in order to make sure that they are not hit by the various types of attacks that frequently can damage or take information from government-run offices.  Read More

photo

Cybersecurity as a subject is always cloaked in mystery when it isn’t dry and technical. Two recent developments may let some organizations wish that they had a little bit more privacy with regard to their information, while others wish they had more insight into future growth. Understanding how to make use of modern advancement in safety on the technical side of things is difficult for many organizations, but essential. In order to protect themselves and their clients, organizations need to be able to develop the systems necessary to thwart, or at least detect, intrusions on their networks.  Read More

photo

Cybersecurity is comparable more to an arms race than traditional security, due to the way that hackers and IT professionals must continually test their methods of attacking and defending against the latest strategies used by their opponents. Virtual machines and partitioned sandbox servers let those working on defense hire white hat hackers to crack their networks on purpose in order to expose weaknesses. Faked servers are used by hackers in the same way to test ways of getting information without being detected. In order to stay ahead of attackers, those who are focused on defense need to continue to push ahead.  Read More

photo

Finding security experts for companies is becoming increasingly difficult in a world desperate for professionals who can keep networks safe. Due to the financial losses that can be inflicted upon companies by hackers, it is important for organizations to spend more on security. Federal agencies are frequently in the market for new security experts, but the salaries paid to those who work for the government frequently have a hard time matching those paid by private groups. According to a recent survey by Piper Jaffray, 75 percent of Chief Information Officers polled said they would increase spending on security in 2015. This can be very difficult for agencies working on fixed budgets, which must balance the cost of security with the need to update and maintain existing infrastructure.  Read More

photo

Federal agencies should be ready to increase their cybersecurity over the coming years. Recent high-profile hacks have caused widespread panic over the insecurity of U.S. companies, so finding out exactly how to create a powerful system of defense for groups that host sensitive data has been a major priority. Because there are so many different ways that hackers can attempt to seek access to servers in organizations in the U.S., there are many bases that must be covered. Utilizing top-tier technology and strategies like cloud migration may be in the future for agencies with the need to store and process secure data.  Read More