Cartoon illustration of 7 hands holding mobile phonesMOBILE APPLICATIONS

TOOLS: How IT and End Users Can Build Mobile Apps with RMAD Tools. High-profile cybercrime such as data theft, ransomware and computer hacks seem to be occurring more frequently and with higher costs, but cloud computing may provide the security that companies are searching for, experts suggest. Read more

ONLINE BANKING: Hackers Target Your Mobile Bank App; You Can Fight Back. A veritable flood of consumers is heading for mobile, according to Juniper Research. It predicts over 3 billion people around the world will be banking on mobile by 2021 — quite a lure for hackers who target financial apps. That means more people are likely to fall prey, so bank customers will need to be ready to protect their devices and their bank accounts. Read the rest

SECURITY: How to Expose Flaws in Custom-Built Mobile Apps. A software bill of materials can help uncover known vulnerabilities and keep corporate apps more secure. Find out more

ENTERPRISE: Enterprise Mobile Apps Are Still Treated as Second-Class Citizens. Surveys document the rising importance of mobile apps to digital-crazed enterprises — yet, nobody is happy with how they’re being built and deployed. Read more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems July 2017

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Mobile Applications – Daily Tech Update – August 8, 2017

Leave a Reply