FEDERAL GOVERNMENT CONTRACTING: Feds Prep for Cybersecurity Buying Spree. The U.S. government’s objectives for improving cybersecurity are taking shape in updated contracting procedures, contracts and projected increases in spending. Several recent developments have underscored the federal commitment to bolstering the protection of IT resources. On the contracting front, the General Services Administration has asked vendors to respond by Wednesday to a research survey on what it should do to expedite federal acquisition of cybersecurity products and services. Read more

DATA PRIVACY BREACH: Organizing a Data Breach Incident-Response Team. This three-part series focuses on how to 1) prepare to handle a data breach, 2) organize an incident-response team, 3) prepare for a government investigation and 4) balance law enforcement requests with insurance policies requiring breach disclosure. Read the rest

SECURITY: Incident Response Teams Dealing with 3 to 4 Ransomware Incidents Weekly. In the first quarter of 2016, incident response teams from Stroz Friedberg addressed 3 to 4 Ransomware incidents per week. The Ransomware cases they’re seeing are mostly Locky and TeslaCrypt. Read more

RISK & COMPLIANCE: How to Tailor Your Incident Response to the Value of Your Data. Organizations need to map their incident response plans against the value and associated risk of different types of data. Each organization typically has a ‘hierarchy’ of data. A fundamental part of effective security and crisis management is understanding the relative risk that is associated with the loss or theft of different types of data. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems March 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Incident Response – Daily Tech Update – April 19, 2016

Leave a Reply