REGULATORY COMPLIANCE

FISMA, PCI, ETC.: Compliance Doesn’t Have to be Painful. Perhaps the most surprising fact about last year’s slew of data breaches is that the organizations that made headlines were considered compliant with at least one of the common security frameworks, such as PCI-DSS or HIPAA. Read more
[INFOSECURITY-MAGAZINE.COM]

BUSINESSES TO CONGRESS: An Industry-Led Approach To Cybersecurity Can Succeed. The Senate is nearing its first major cybersecurity debate since 2012, opening the floodgates for amendments on issues ranging from consumer data-breach notification requirements to the security of federal computer networks. There is tremendous pent-up demand among senators to weigh in on cyber policy after years of costly hacks and chilling cyber attacks. Read more
[WASHINGTONEXAMINER.COM]

REVISED GUIDELINES: What The New PCI DSS 3.1 Standards May Mean For Your Business. As of the April 15, 2015, the Payment Card Industry Data Security Standard (PCI DSS) 3.0 has been officially retired and replaced with the new standard, PCI DSS 3.1. The new standard released by the PCI Council included some updates to address critical vulnerabilities in the world of Information Security. Read more
[FORBES.COM]

PCI DSS MANDATES: Don’t Fall Behind In Compliance. For enterprises which need to adhere to the Payment Card Industry Data Security Standard (PCI DSS), achieving compliance can be an incredibly strenuous exercise and is often, rightfully, celebrated. Yet, according to the 2015 Verizon PCI Compliance Report, only 29% of reporting companies, successful at their last annual audit maintained full compliance at their next interim assessment. Read more
[BUSINESS2COMMUNITY.COM]

BRING YOUR OWN DEVICE (BYOD)

USAGE POLICIES: How Can IT Managers Prevent Negative BYOD Network Impact? To ensure that BYOD is a benefit to your business, IT must treat end users as partners in how the network is used, rather than bandwidth consumers who need to be managed. The legacy model of command-and-control IT is out of step with today’s technology. Read more
[TECHTARGET.COM]

POSITIVE RESULTS: How To Remove The Dangers Of BYOD With Private Cloud. Today our working lives are almost 24/7 and often we’re working away from the office. To stay connected we use our mobile phones for email and business, even on holiday. So, it’s not surprising then, that Bring Your Own Device (BYOD) is on the rise in the enterprise. Read more
[INFORMATION-AGE.COM]

LEGAL ADVICE: How To Craft An Effective BYOD Policy. A BYOD program can provide several benefits. Employees, who often develop preferences toward particular devices or brands, can use whatever devices they prefer. Instead of having to acclimate to company-issued devices, employees can use devices with which they are already familiar. Read more
[LAW360.COM]

MOBILE SECURITY: Users Worry Employers Can’t Keep Private Data SafeWorkplace smartphone and tablet users worry a lot about their personal information remaining private from their employers — and only a relatively slim majority trusts their employer to keep that data safe, according to a Harris Poll survey. Read more
[NETWORKWORLD.COM]

==========

APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.

==========

ATTN: Federal & State CTOs CIOs CISOs: Daily Tech Update – September 11, 2015

Leave a Reply