IT Security Support Blue Mountain Data Systems


HOW-TO: 6 Biggest Business Security Risks and How You Can Fight Back. Security breaches again made big news in 2014. Yet despite years of headline stories about security leaks and distributed denial-of-service (DDoS) attacks and repeated admonishments from security professionals that businesses (and individuals) needed to do a better job protecting sensitive data, many businesses are still unprepared or not properly protected from a variety of security threats. Read more

MANAGEMENT: Re-imagine User Experiences. When you see a movie or listen to a song, you’re naturally focused on the experience of that content—not on whatever complicated coding might be necessary to create or deliver it. You should expect the same of your work and personal technology. What matters is how the products, services, processes, and people align to deliver rich experiences that help make you more connected, engaged, and productive. Read more [MICROSOFT.COM]

MOBILE SECURITY: Why Smart Devices And Wearables Will Be Security’s New Headache. Smart devices largely use the same operating system as their smartphone counterparts. This is the case with Android devices. When we talk about smart devices and Android, we’re talking about a mature platform in terms of malware. Read more


CISCO: All Hands on Deck. Networking giant Cisco is sounding the alarm on security, calling for an “all-hands-on-deck” approach to defend against escalating cyberattacks. Cisco’s 2015 Annual Security Report examines both threat intelligence and cybersecurity trends and includes stark warnings for enterprises large and small. Read more

TRAINING: Where to Go to Learn About Network Security. The one thought on seemingly every business’s mind is network security. This is understandable given the damaging attacks launched on companies like Home Depot, Target, and Sony in the past year-and-a-half or so. Read more

DATA TRACKING: Privacy Fears Arise Over Health Care Web Site. The government’s health insurance website is quietly passing along consumers’ personal data to outside websites, just as President Barack Obama is calling for stronger cybersecurity protections. Read more


DATA BREACH NOTIFICATION: Step Aside, States? In the fall of 2005, 44 state attorneys general came together to send a joint letter to Congress and share their concerns about a proposed federal law on data breach notification. Such letters are exceedingly rare, as state attorneys general come from competing political parties and states with varied interests. However, nothing brings state government officials together like a congressional effort to limit states’ power to assist their own residents. And that is just what Congress was doing. Read more

TEXAS: Embattled Tech Firm Keeps State Contract. While a mushrooming scandal complete with state and federal investigations prompted two Texas state agencies to cancel contracts with Austin technology outfit 21CT last month, the state of Texas has not completely cut ties with the company. Read more

VERMONT: Auditor: Health Expert’s Invoices Unsupported. Vermont is applying a fresh round of scrutiny to its contract with Jonathan Gruber, the Massachusetts Institute of Technology health economist who made headlines for talking about “the stupidity of the American voter.” Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – February 25, 2015

Leave a Reply