IT Security Support Blue Mountain Data Systems


COMPLIANCE: New PCI SSC Penetration Testing Guidelines Aim To Be More Prescriptive. In an effort to help enterprises hurdle an ongoing compliance stumbling block, the PCI Security Standards Council (SSC) has issued new supplemental guidance on penetration testing.
Read more

SECURITY STANDARDS: PCI Issues Penetration Test Guidance. New guidance from the PCI Security Standards Council specifies how businesses should use penetration testing to identify network vulnerabilities that could be exploited for malicious activity. Read more


NEW RULES: Balancing Risk Against Opportunity Is A Job For Both IT And Marketing. What do CMOs want from CIOs? Mary K. Pratt explores that question in a Computerworld article, “7 things marketing wants to say to IT.” Some of the things chief marketers want are going to set your teeth on edge. Read more

WHITEPAPER: Three Burning Questions your IT Must Answer. Most large companies have spent significant amounts of money over the last few years to restructure and update their infrastructure to keep pace with the demands of their business and major changes in technology. Read more

IT MANAGEMENT: Ten Tips on How to Get That Employee to Admit His Wrongdoing. Let’s say you’re the chief security officer in your company, and you have a trusted network administrator who comes to you and says she had left her purse in a secure area of the data center when she went to attend a meeting with a couple of managers, and when she returned. Read more


MOBILITY: The 5 Mobile Devices Cities and Counties Prefer. When Bernard Hanzer joined the city of Richmond, Va., in 2013, the IT manager noticed that many users had tablets, notebooks, desktops and smartphones. “Everyone was saying that they had to have these four or five devices, and I wanted to understand why that was,” he says. Read more

WORKFORCE: Agencies Seek At Least $75 Million In Digital Service Funding. It’s no secret that the federal government is on the lookout for a few good geeks. The fast-growing U.S. Digital Service, housed at the Office of Management and Budget, trying to induce private-sector techies to do a stint in government. Read more

WORDPRESS: ISIS Backers Deface Websites. Sympathizers of the Islamic State terrorist group are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news organizations, businesses, religious institutions and governments in the U.S. and abroad, according to the FBI. Read more


HACKER TAKEDOWN: Cybercrime Fighting Group Wipes Out Malicious Servers. A new group of international cyber-crime-fighters has claimed one of its first kills. The group has pulled the plug on malicious servers that hijacked at least 12,000 machines, most of them in the United States. Read more

MALWARE: Bad News Everyone: Cybercrime Is Getting Even Easier. Around one in three (30 per cent) of end-users click through a malicious URL in an email even though they have been warned of the danger. “End users are increasingly desensitised from the warnings, don’t feel responsible and still lack enterprise-driven education,” according to Websense.
Find out more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – May 20, 2015

Leave a Reply