STRATEGY & PLANNING: How To Save On SEO Without Being Cheap. A wise person once said that if you think search engine optimization (SEO) is expensive, you should see how expensive cheap SEO gets. There are few shortcuts when it comes to sustainable search engine optimization. As with any other professional service, quality SEO comes at a price — and premium services are more likely to deliver desired results. Read more

GODADDY INTERVIEW: Educating Teams About SEO and Getting Things Done. At SEJ Summit Silicon Valley, SEJ Founder Loren Baker had the opportunity to hang out with Jim Christian to talk about educating teams within the workplace about SEO. In this video, he discusses how really getting to know your people can help get things done. Read more

CHOOSING AN SEO AGENCY: Personal Referrals Drive Nearly Half Of Selections. Referrals are leading driver of hiring decisions for search engine optimization (SEO) companies, but do not always produce good results, according to new research. The study, from Clutch, a source of reviews on SEO companies, indicates that company attributes such as knowledge, customer service, and transparency were the next largest influence, mentioned by 43% of companies. Read more

SEO: Taking a Backseat to Social Media? It seems like such a short time ago, that changes in the Google algorithms could send a company that relies on search engine optimization to help market its products into a frenzy. Having the right keywords, placed carefully in web pages, was the key and aim of everyone looking to get on the first page of a Google keyword search. Read more


STATE OF CYBERCRIME: How to Defend Against Insider Threats. In the real world, the person behind an organization’s next security breach might be much closer than anyone realizes. A recent PwC survey on the state of U.S. cybercrime found that nearly 30 percent of all security incidents were triggered by insiders, which include employees, trusted contractors and partners. Read more

IMPLEMENTING AUTHENTICATION: Cyber Sprint Laggards Tell Their Stories (Anonymously). Some agencies started at zero but rocketed upward during the federal governments sprint to improve two-factor authentication levels. Some agencies started and stayed high. And some agencies, somehow, saw their two-factor authentication levels actually drop during the sprint. Read more

PROLIFERATED MFA: 5 Big Changes To Computer Security. Now almost all malware is created to steal money or corporate secrets. The script kiddies are almost gone, pushed out by the professional hacker gangs that make millions of dollars each day victimizing home users and corporations with almost no threat of being caught or prosecuted. Malware has gone from innocuous, funny viruses and worms to identity-stealing programs and ransomware. Read more

STILL EVOLVING: How Does Facial Recognition Technology Work? Facial recognition technology is not exactly a new phenomenon, for all the recent headlines. The first experimentations with the technology can be traced back to the 1960s, although, back then, the research going into its development was kept quiet. Whereas today the science behind the software is much more mathematical, automatic and underpinned by sophisticated computer power, the early models required a greater level of human input and were therefore semi-automated. Read more


APPLICATION DEVELOPMENT: Blue Mountain Data Systems is dedicated to Application Development and Systems Integration for Federal Civilian Agencies, Document Management Systems that help in the preparation, scanning, indexing, categorizing and quality control of millions of pages of paper documents to electronic format and the Automation of Workflow Processes. Call us at 703-502-3416.


FYI: Federal & State CTOs CIOs CISOs: Daily Tech Update – October 13, 2015

Leave a Reply