Simple Best Practices to Protect Your Computer from Hackers
Pay more attention to what you are clicking. Smart computer habits prevent mass network disruption.
Pay more attention to what you are clicking. Smart computer habits prevent mass network disruption.
It’s a scary cyber world out there. Threats are becoming more sophisticated, effective, and pervasive everyday. According to a Government Accountability Office report, cyber threats to federal agencies increased 782 percent between 2006 and 2012. What’s more, a Center for Strategic and International Studies study estimated the global cost of cybercrime at over $400 billionRead… Read more »
No, this approach wouldn’t have saved the Titanic, but that doesn’t mean you didn’t miss lots of Titanic references in yesterday’s online training, Zero Trust: The Next Generation Security Architecture for Government. Not the ones that crack at the part where Rose and Jack float away on the raft, but the ones “where bulkheads wereRead… Read more »
Today, I’m attending Microsoft’s Federal Executive Forum 2015. The day is focused on applying technology solutions to many government challenges, particularly in the area of cybersecurity. But before we dove into the devices, systems, and solutions available to agencies, we heard from General Keith Alexander, former Commander of US Cyber Command, Director of the National Security AgencyRead… Read more »
There is no question that security is becoming one of government’s top IT concerns. Breaches have become so frequent that it is no longer a question of if they will occur, but when. According to a GAO report, the number of security incidents at federal agencies that have involved the potential exposure of citizens’ personalRead… Read more »
The following post is an excerpt from GovLoop’s recent executive research brief, Transforming Agency Security with Identity and Access Management. In the brief, we discuss the importance of consolidating and automating IAM systems to better secure information at government organizations. The first step to securing user accounts and privileges at your agency is to consolidate all currentRead… Read more »
The following post is an excerpt from GovLoop’s recent industry perspective, The Evolution of Identity Management. In the brief, we discuss why organizations must reassess the way they verify accounts and credential their users. We also offer tactics to help evolve government identity management strategies. When determining how your agency should verify the identity of it’s users, thereRead… Read more »
Home security and personal security are subjects everyone can relate to, and safely assumed to share the same level of importance to most people. While we might not conscientiously put thought into foiling a burglary or assault, we do in fact take steps to enable successful prevention of crime…we take steps to protect ourselves. As… Read more »
A few weeks ago I wrote about my memorable December 2014, when I saw some original, founding historical documents. While I was busy time traveling, our City IT staff was spending the Christmas holidays struggling with a very nasty gift from a very bad Santa. It has passed into our lore as the “Christmas DDoSRead… Read more »
Everyone loves their downtime. However, what we don’t consider is the wasted time and productivity loss as we wait to get access to the things we need to do our jobs effectively. We’ve all experienced it before; as a user we need to request access, that request is routed to the appropriate approver, and dependingRead… Read more »
Notifications