EXEC TECH: BYOD is Evolving for a Cyber-Conscious Age. Kimberly Hancher, former CIO at the Equal Employment Opportunity Commission, helped craft the White House BYOD policy in 2012. That document outlines a broad set of guidelines that agencies can use to establish the proper parameters for mobile access. Yet four years later, she said, there aren’t enough clear policies at federal agencies. “I don’t think most agencies are really undertaking the effort and due diligence to address BYOD policy,” she said. “They’re just sort of letting people do whatever they can get away with, and very few agencies have actually put formal policies in place.” Read the rest
USERS: Don’t Mess with iOS 10 or Android Nougat Betas. There’s a lot of interest in the beta releases of iOS 10 and Android Nougat, and while most people are free to explore the new platforms, BYOD users should hold off from testing them. Find out more
ENTERPRISE: The BYOD Evolution: Three Common Approaches. It has become a way of life for employees to bring personal devices to work, whether or not your organisation has a BYOD policy. Employees want the ability to use their own phones, tablets and laptops at work, without losing ownership or control of those devices. But this should raise some red flags for a company’s IT and security teams. The modern issues with BYOD have gone beyond just basic user-privacy issues, to the serious security and compliance matters that need to be addressed to ensure IT ecosystems are not vulnerable. Read more
INDUSTRY INSIGHT: Balancing Mobility with Security: What Government Can Do. The consumerization of IT is not only changing the way employees work, it’s changing their expectations of government IT. Employees look to their agencies to provide modern IT services, interfaces and capabilities — most of which have historically been the responsibility of IT departments. The trouble is that accommodating the mobility demands of today’s users presents a fundamental security challenge to IT teams used to retaining control of every system, app and network under their purview. How do IT teams balance the demands of flexible and secure mobility, accommodate users’ preferences and modernize their IT environments? Here are a few considerations. Read the rest
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.