Hands on laptop with "CYBERSECURITY" word on spacebar button.CYBERSECURITY

CYBERSECURITY: How to Devise a Winning Strategy. Cybersecurity incidents and breaches can seriously damage a company, making it imperative that security risk management is integral to corporate governance. Read more

IN PLAIN SIGHT: Why Military Veterans Are a Great Fit for Cybersecurity Careers. A 2017 report from the IBM Institute for Business Value (IBV) proposed a “new collar” approach to recruiting. This strategy means recruiting professionals who lack traditional college degrees but possess the technical skills and aptitudes of explorers, problem solvers, students, guardians and consultants. One sector where these attributes can be found in abundance is the military. Read more

RANSOMWARE ATTACK: Three Cybersecurity Lessons From Atlanta. On March 22, Atlanta’s city government was hit with a ransomware attack, with hackers demanding six bitcoins in exchange for releasing the data. At the time of writing this, that’s a demand for roughly $41,880. As a result of the attack, many systems in Atlanta are offline. Some of the city’s services have been forced to return to the “pen and paper” method of operation. This episode highlights the growing dependence of state and local governments on information technology systems and emphasizes how their cybersecurity (or more accurately, insecurity) can impact the broader national security issues. Here are three quick takeaways from this episode, each likely worthy of much more in-depth development. Read more.

CAREERS: McAfee Report Suggests Gamers Could Thrive in a Cybersecurity Career. Cybersecurity firms are feeling the pressure from having to deal with increasingly complex and voluminous cyberattacks. Compounding the issue is that many senior security managers feel it is difficult to attract the kind of talent needed to deal with emerging threats. The solution might be to focus on gamers, according to a new report by McAfee. Read more.


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems March 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-march-2018.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Cybersecurity – Daily Tech Update – April 6, 2018

Leave a Reply