HACKERS: More Hackers Relying on Compromised Credentials. Dell SecureWorks Researchers Describe Latest Trends. Cybercriminals are adapting their attack techniques, moving away from attacks waged with malware to using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks. Read more
IRS: Data Breach Should Sound Eerily Familiar to Bankers. For bankers, there are scary parallels between the IRS’ failure to protect sensitive personal information and their own such struggles. Read more
SECURITY: Identity Theft Makes Half of Data Breaches. In 2015 around the world, 1,673 data breaches led to 707 million data records being compromised, according to Gemalto. Gemalto’s Breach Level Index shows that more than 3.6 billion data records have been exposed since 2013 when the index began benchmarking publicly disclosed data breaches. Read more
INVESTIGATIONS: Verizon Releases First-ever Data Breach Digest with Security Case Studies. Verizon is known for its huge annual Data Breach Investigations Report, but it has released a less data-heavy digest organized by case study. Read more
INFORMATION MANAGEMENT: What are the Numbers, Facts and Figures Behind Big Data? Business leaders know they want to invest in big data, and they have high expectations on ROI, but do they really know what big data is? Read the rest
IoT: The Internet of Things Will Make Big Data Look Small. Get ready for the data deluge. It’s kind of amazing that we all settled on the term “big data” before the “Internet of things” really arrived. That pending revolution, in which we’ll see all kinds of new objects connected to the Internet thanks to the cheap hardware provided by the smartphone boom, will generate information on a scale we can’t even really comprehend yet. Read more
MASSACHUSETTS: Report – Big Data Booms in Massachusetts. In Massachusetts, big data is big business. A new report finds that 53 new big data companies have come to Massachusetts since 2014, bringing the number to 537 – a jump of about 10 percent. Read more
STATISTICS: Part of the Massive Big-Data Future. Statistical methods make it possible to run the analyses that make big-data analytics possible. Read more
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems February 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-february-2016.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.