GOOD CHANGES: Why BYOD Spells Good Changes for IT. Enough with the fear and loathing of Bring Your Own Device (BYOD) policies. Your IT staff should be happy about the shift in responsibilities. Read more

IT STRATEGY: Shadow BYOD Runs Rampant in Federal Government. Survey highlights the extent to which government employees insist on bringing their own devices to work, despite rules to the contrary. Read more

EDUCATION: The Jury Is Out on the Future of BYOD in Schools. How will the current edtech trend ‘BYOD’ – or ‘Bring Your Own Device’ fare in K-12 schools in 2016? Read more

CES 2016: Dealing with the Network Challenges Presented by the Internet of Things. With everything from ceiling fans to smart feeding bowls for pets now connecting to the expanding Internet of Things, how can network and IT professionals cope with the escalating pressure on bandwidth and capacity? Read more


SURVEY: Releases Findings into NHS IT Security Levels. Sophos recently released the results of its survey assessing IT security levels within NHS organizations. The study, which included 250 NHS-employed CIOs, CTOs and IT Managers, revealed a gap between perceived beliefs of IT security levels and the actual IT security structures that are currently in place, with 76% of respondents believing that the NHS is well-protected against cyber-crime. Despite this, as little as 10% felt that encryption was well-established within the NHS. Read the rest

INDUSTRY 4.0: Revolutions Require Security — From The Outset. It is said that the ‘fourth industrial revolution’ is taking place right now. It’s said to be bringing massive disruptive changes to the way humanity produces stuff and does business. There are great hopes that these changes will help bring about a leap in business productivity and efficiency. At the same time, there are fears it could also cause millions of job losses and bring poverty to whole communities. With so much at stake, it’s more than just a buzzword; it’s also why it’s this year’s central theme at the World Economic Forum. Read more

CLOUD COMPUTING: Why Cloud Computing Will Shake Up Security. In 2016, you can expect massive changes in the security landscape. Technology providers such as firewall vendors, switching vendors and others will fade as new solutions better suited to the cloud computing environment emerge. On the flip side, companies that provide encryption and anti-malware technologies will continue to see their fortunes rise because the demand will continue to grow. But to thrive, these vendors must bring out new products and services evolved for cloud computing. Read more

PC SECURITY: How to Build the Ultimate Free PC Security Suite. Take some time next weekend to secure your PC without spending a dime. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems December 2015

BLUE MOUNTAIN DATA SYSTEMS = EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

IT SECURITY SUPPORT FROM BLUE MOUNTAIN DATA SYSTEMS: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – January 25, 2016

Leave a Reply