MOBILE SECURITY: BYOD Can Pose Privacy Risks to Employees. Companies using MDM to oversee employee devices are collecting more information than employees realize. Read more

EDUCATION: What Are the Best BYOD Tools for Presentation, Collaboration and More? Besides simply having technology in the classroom through BYOD programs or others, schools are increasingly being pushed to use it well and limit the “digital use” gap that exists between students from low-income families and their wealthier peers. Active tech use, while challenging, is critical for the next phase of K-12 education technology. Read the rest

ENTERPRISE: Dude, Where’s My Phone? BYOD Means Enterprise Security Exposure. You should be worried, very worried, if an employee loses a smartphone or tablet—especially if that employee accesses any enterprise resources using that device. Find out more

OPINION: BYOD? More Like “Bring Your Own Divide”. There is no way around it: the modern workforce is mobile and relies on CXOs to deliver enterprise security in the clearest way possible – no matter where they find themselves. CXOs need to embrace their businesses operational models and define strategies to secure critical data. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems May 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


BYOD – Daily Tech Update – June 24, 2016

Leave a Reply