WINDOWS 10 & PDF: Signing Your Name in Digital Ink. Typing in text on a PDF form is tidier and saves time, but on a touch-screen Windows 10 computer, it is possible to “sign” PDF forms on the screen, instead of having to download a filled-in form, print it out, sign it, scan it and mail it. Find out how. Read more
INVENTORY: Take 15 Minutes Now to Make a Video of Your Possessions. Grab your phone, put it on video mode and walk around your house for 15 minutes getting footage of every room, every wall and, if you can manage it, the inside of every drawer. That’s the advice of insurance experts, who say if there’s one easy thing you can do to aid the insurance recovery process from any natural disaster, it’s having photos of your belongings. Read more
SECURITY: Protecting Your Digital Life in 9 Easy Steps. In a Medium post, Quincy Larson, the founder of Free Code Camp, an open-source community for learning to code, detailed the reasons it might be useful for people to make their personal data more difficult for attackers to obtain. “When I use the term ‘attacker’ I mean anyone trying to access your data whom you haven’t given express permission to,” he wrote, “whether it’s a hacker, a corporation or even a government.” Here are some of basic security steps he recommends. Read more.
TOOLS & SKILLS: No, Seriously – Do This Now: How to Protect Your Digital Life. How to set up two-factor authentication for all of your online accounts. Read more.
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-january-2018.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.