ONLINE QUIZ: How Many Times Has Your Personal Information Been Exposed to Hackers? At least one billion Yahoo users had their information stolen in 2013, the company said last week, months after it disclosed a different attack in 2014 that affected 500 million users. Several other major companies have been attacked since. Answer a few questions to learn which parts of your identity may have been stolen in some of the major hacking attacks in the last three years and what you can do about it. Find out more
TRAVEL: 6 Ways To Keep Phone Charges Low During International Travel. t’s a sure-fire way to dampen the holiday cheers: Spend a week on a dream vacation abroad, then come back to find an additional several hundred dollars on your cellphone bill. Although some U.S. phone plans cover international travel, especially to Canada and Mexico, many don’t. Leaving your phone off isn’t practical these days. But you don’t have to pay a fortune if you follow these tips. Find out more
PRIVACY: Worried About the Privacy of Your Messages? Download Signal. you would be foolish not to download the messaging app Signal onto your smartphone and computer. The free encrypted messaging service has won the acclaim of security researchers and privacy advocates, including Edward J. Snowden. All have said that Signal goes above and beyond other chat tools in keeping electronic communications private. Find out more
2017: The 7 Unmissable Tech Predictions That Will Define 2017. Big Data. Internet of Things. Virtual Reality. Industry 4.0. These were all prime fields of growth and innovation in 2016. These trends are predicted to continue into next year and probably far beyond. Find out more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems November 2016 http://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-november-2016.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.