Posts By Megan Pleasant

How Federal Health Agencies Can Step Up Their Cyber Defenses

Federal healthcare organizations hold a wealth of personal health information that’s often vital to carry out national security, readiness, and disaster response efforts. Unfortunately, that also makes these agencies prime targets for both criminal and nation-state adversaries. Let’s take a look at common pain points agencies might experience while trying to protect their data: •Read… Read more »

Hands giving thumbs up in a circle with words beside them stating service, efficiency, customer, reliability and quality.

Balancing Efficiency and CX

On paper, your CX goals and deliverables probably look great. You might even have strong leadership support and team buy-in. But in the daily grind of work and competing priorities, how can you ensure the long-term success of your CX programs? CX teams are often tasked with lofty goals while also remaining an efficient, leanRead… Read more »

Workplace conflict

Navigating Workplace Dynamics at Your Agency

Every agency’s workplace is dynamic. It’s unique to your organization’s values, processes, and, most importantly, personalities and perspectives. Navigating these internal dynamics can be tricky and downright stressful, but as a supervisor, it’s critical for you to lead your team effectively without succumbing to conflict or confrontation. Here are three quick key takeaways from thisRead… Read more »

Two friends chat in a park about accessibility.

Make Constituent Services More Accessible

Accessibility ensures that all citizens, regardless of their circumstances, can understand and utilize the support available to them. Prioritizing accessibility also enhances civic involvement and promotes equity. In short, understanding how to improve accessibility helps government agencies to better fulfill their mission of serving the public. During our recent CX Community of Practice, Michelle Pinsky,Read… Read more »

Agency Building with Money Shaking Out of It

Take a Bite Out of Waste, Fraud and Abuse

Identity proofing, or identity verification, refers to the process of gathering data and analyzing signals to confirm an individual’s identity and assess the risk of conducting a transaction with them. Many individuals have extensive digital trails, making it easy to verify their identities with a high level of confidence. But think about younger individuals whoRead… Read more »

Cybersecurity

Best Practices in Zero-Trust Architecture

Agencies need to tackle cybersecurity in a holistic way, relying on zero-trust strategies that shift from complex and inefficient approaches to more streamlined, process-oriented systems. Let’s explore a few ways that you can make that shift with these zero-trust best practices from Richard Breakiron, Senior Director of Strategic Initiatives for the Americas Public Sector atRead… Read more »

Lit match with fire

How to Handle Fire Drills

Someone else’s emergency is not necessarily your emergency. However, as supervisors, your team’s fire drills actually are your problem, and you have to stay calm when the heat is on. So, how can you possibly manage everything that comes across your desk in a productive, organized way? By understanding the dynamics of crisis management andRead… Read more »

Illustrated person giving 5-star review.

Get Better Public Input During Policymaking

How can we ensure that the voices of the public truly shape the policies that govern their lives? Engaging the public effectively in policymaking and planning is crucial for creating inclusive and representative policies. Fortunately, emerging digital tools enable agencies to reach a broader audience as well as gain more feedback and public engagement. DuringRead… Read more »