Simple Steps to Security in the Cloud
In recent years, agencies have become more cognizant of the cloud and its potential benefits, but the comfort of the status quo still beckons.
In recent years, agencies have become more cognizant of the cloud and its potential benefits, but the comfort of the status quo still beckons.
As Georgia’s Chief Information Security Officer (CISO), David Allen has seen many ransomware attacks. In some cases, agencies have bounced back in days. In others, they’ve been reduced to using pen and paper.
“Most people are working in systems that do not support them,” Hillard said. “If you find what’s in it for them and start to approach [engagement] from that angle, that is a way to take disengaged employees and bring them back to the light.”
For some agencies, it isn’t so much that the desire to make data-driven decisions is lacking, the issue is they don’t have the necessary capabilities to fully support those efforts.
Welcome to the latest edition of GovLoop’s exciting federal employment opportunities roundup for the week of June 5, 2020.
Onondaga County, N.Y., Water Authority began using drone technology to inspect its water tanks, and gathered more information faster and saved costs.
Tuesday, June 30 from 10:00 a.m. – 2:10 p.m. ET/7:00 – 11:10 a.m. PT, you can join the Amazon Web Services (AWS) Public Sector Summit Online where you’ll learn how you can maximize your organization’s innovation.
Although agencies have worked to do the best they can, some IT systems just can’t meet the moment. But cloud solutions can give government workers and their agencies the scale and flexibility to rise to the challenge.
When the COVID-19 crisis forced many federal employees to start working from home, agency IT leaders found themselves in a new environment — employee living rooms. They quickly realized that while their business continuity plans address key issues around connectivity, security at this scale has proven to be something of an afterthought.
As telework has expanded across government, and will likely permanently shift the paradigm of public and private sector work, technologists have had to pay special attention to maintaining security while not stifling users.