In the wake of recent high-profile government breaches of personal information, the feds have published guidelines for protected controlled but unclassified information handled by contractors, which will be incorporated into contracts. The vulnerability of personally identifiable information held by the government has become a high-profile issue in the wake of breaches at the Office of Personnel Management (OPM) and the IRS. It also is an issue for
SIEMs Like a Good Idea: Federal Agencies Need More Than Just Perimeter Defenses to Protect Against Cyber Threats
It’s a scary new world. Cyber threats and information security incidents – particularly at the federal government level – are on the rise, which signals that many of the security systems that federal government agencies have been using to detect and prevent information security breaches simply aren’t cutting it. More specifically, no longer are traditional perimeter defenses, such as firewalls and intrusion prevention and detection systems (IPS/IDS), enough to keep the breaches at bay.
Vendors, resellers, and the entire unified communications (UC) and unified communications & collaboration (UC&C) channel must pay special attention to small- and medium-sized businesses (SMBs). Everything about them – from what they want from platforms to how they go about the shopping and buying process – is different than it is in the enterprise environment. An important first step is to recognize the broadness of the SMB sector.
The ability to communicate and collaborate across departments and throughout business divisions is in many ways inherent to the process of financial planning, budgeting, and forecasting. Indeed, collaboration is perhaps more important to finance than any other function of a business (except for possibly sales). Quite simply, members of finance teams and executive leadership can’t be expected to have direct
Despite increasing adoption of cloud services under FedRAMP, the most recent FISMA report shows some agencies are struggling to track and manage risk in the cloud. By William Jackson, The Tech Writers Bureau Government is moving slowly to the cloud and analysts expect the pace of adoption to increase over the next few years. But the most recent report on
The Bring Your Own Device (BYOD) work structure has been around as long as mobile devices. It gained a catchy name and new momentum with the advent of WiFi, smartphones, and tablets during the past decade. The most pertinent BYOD question as we head toward the summer of 2015 is simple: Is the counter-argument to BYOD — that all that
Between the rapid growth of mobile communications, and the advent of the anywhere, anytime enterprise, Unified Communications as a Service (UCaaS) has been getting increased attention. Forecasts vary greatly, but one thing they have in common is that the UCaaS market is expected to grow substantially over the next few years. For many organizations, it’s not if you’ll move to
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!