Posts Tagged: Security

How to manage Internet Security software in your PC

Responsibility to manage Internet Security begins with an individual. The risks are always there and the following are a few practical steps, which you as a responsible individual can take to improve the security of your network. Refrain using shared/public systems: Do not use public computers for carrying out transactions such as investment transactions orRead… Read more »

4 Reasons to Attend Our Mobile Security Event

Smartphones. Tablets. BYOD. Oh my! Now, you have access to your data at all times, 24/7. You’re no longer disconnected when you leave your office. It’s obvious to anybody how far our society has come with mobile technology and the unique opportunity it presents to transform the way government operates. But in order to capitalizeRead… Read more »

5 Reasons to Attend Our Cybersecurity Event

Target. LivingSocial. The Federal Reserve. In today’s environment, every organization is at risk of having its data and infrastructure compromised. For security professionals today, being secure isn’t just about thwarting attacks – it’s also being prepared to react once you fall victim to a cyberattack. That’s why we’re hosting an upcoming in-person event on cybersecurityRead… Read more »

Windfall Elimination

http://www.psretirement.com/windfall-elimination-reductions/ The Windfall Elimination Provision (WEP) only impacts individuals who earned a pension in any job and did not pay Social Security taxes, but worked long enough in other jobs to be eligible for Social Security Retirement or benefits due to disability. The Windfall Elimination Provision impacts Social Security benefits when any of an employee’sRead… Read more »

INSA Security Clearance Reform Recommendations

Since 1947 the average spy began committing espionage after 12 years of service. That highlights why periodic reinvestigations (PR) are critically important. The influential Intelligence and National Security Alliance (INSA) has released the Security Reform Policy Council white paper on Leveraging Emerging Technologies in the Security Clearance Process. INSA includes a number of connected, heavyRead… Read more »

Step-by-Step Guide to Getting Started With Security Governance

Article Posted on behalf of Vo Ballard of Cask, LLC. – If the word ‘governance’ sounds like a high level concept that is only applicable to high level managers, chances are you may be missing the cornerstone of a framework that guides and directs the why and how your organization conducts business. If you thinkRead… Read more »

The 4 A’s Government Needs to Protect Your Privacy

“You’ve been hacked.” That is the line that every person dreads waking up to in their inbox. But securing your identity and your privacy is no easy task. The government has been using identity and access management tools for years, commonly known as IAM. IAM uses a four part verification process that helps cut downRead… Read more »

Unleashing the Power of Technology: Driving American Excellence through Innovation, Analytics, Efficiency, and Security

Please join in the discussion! GTRA Technology Council Meeting – Government IT Security Collaboration June 22 – 24, 2014 The Lansdowne, Leesburg, VA http://govtechcouncil.org/index.php/council-meeting/june-2014 Unleashing the Power of Technology: Driving American Excellence through Innovation, Analytics, Efficiency, and Security The GTRA Technology Council Meeting brings together an elite group of federal IT leaders who believe inRead… Read more »

Alcohol and Your Security Clearance

Your use of alcohol and, more specifically, the following circumstances, can impact your eligibility for a security clearance: a. Criminal conduct involving alcohol b. Counseling or treatment for alcohol use c. Excessive use/drinking to intoxication There are various sections on the Personnel Security Questionnaire SF-86 which can elicit responses to determine if your judgment shouldRead… Read more »

Huffington Post Interview With Xerox’s Chuck Brooks

http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-in_2_b_4620232.html?utm_source=Alert-blogger&utm_medium=email&utm_campaign=Email%2BNotifications www.huffingtonpost.com/brian-e-finch/”,”background_color”:”#cccccc”,”font”:”lucida grande”,”layout”:”button_count”,”author_nickname”:”hp_blogger_Brian E. Finch”,”entity_type”:”1″,”entity_id”:320489,”hp_track”:”Author Info”,”vertical_id”:0}”> Cybersecurity Industry Interview With Xerox’s Chuck Brooks by Brian Finch, Partner, Dickstein Shapiro, LLP As we kick off 2014, I am starting the New Year with an interview series, which will provide an overview of the cybersecurity industry. I spoke with Vice President and Client Executive at Xerox, ChuckRead… Read more »