PRODUCTIVITY: BYOD Brings Greater Productivity – as Well as Security Issues. The bring-your-own-device (BYOD) trend continues to be perplexing for many enterprises. It holds the promise of greater employee productivity and mobility, but also comes with its share of security problems. Past studies and surveys note the benefits and challenges of BYOD, but also stress the need for businesses to adopt policies to manage and secure the devices coming onto the network. Read the rest

CLOUD: Shadow IT and Other Cloud Excuses. In an age of bring your own device (BYOD) to work, those in charge must take charge. They must balance their employees’ use of self-selected technology and/or their self-deployment of commercially available cloud services with senior managements’ lack of direction. Unfortunately in many large entities those with initiative are viewed as rogue “shadow IT” users who detract from the mission, not as innovative, clever individuals who optimize off-the-shelf solutions to soldier on. Read more

MOBILITY: Seattle Retools Its Technology to Attract Younger Workers. As baby boomers retire from public-sector IT departments, state and local governments are revamping their technology to attract a millennial workforce. Whether tablets and smartphones arrive in offices through bring-your-own-device (BYOD) initiatives or government-procurements, their expanded use heightens the need for optimized software, appropriate security and precise use policies. Read more

SECURITY: 7 Potential Security Concerns for Wearables. Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise 18.4% this year, when another 274.6 million devices are sold. Read more


IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems March 2016

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


BYOD – Daily Tech Update – April 18, 2016

Leave a Reply