Govtech.com
May 22, 2016    /    by

Beyond Spear Phishing: How to Address Whaling and More

First, there was phishing … then came spear phishing … and now there is whaling — and other new sophisticated social engineering techniques. The bad guys are modifying their deceptive practices. Here’s what you need to know.

credit: Shutterstock/Bildagentur Zoonar GmbH

READ MORE

May 15, 2016    /    by

Book Review: Cybersecurity for Everyone

How do you secure your home or small business network? A recently released book by Terence L. Sadler offers practical, helpful answers.

May 8, 2016    /    by

State Technology Leaders Focus on Procurement, Cybersecurity and Agile

The National Association of State Chief Information Officers (NASCIO) held their Midyear Conference in Baltimore this past week. There were plenty of hot topics on the agenda, including: enabling innovation through agile software development, the continuing need for procurement reform and a big push on cybersecurity.

NASCIO Midyear Conference 2016 in Baltimore - credit: Lohrmann

READ MORE

May 1, 2016    /    by

7 Reasons You Should Care if the United Kingdom (UK) Leaves the European Union (EU)

On June 23, the world will be watching as the citizens of the UK decide whether to remain in the EU. The ramifications of this vote go far beyond Great Britain or Europe. History shows us that American interests and our future security are directly tied to this “special relationship.” Here’s why you should care what happens.

credit: Shutterstock/nikom737

READ MORE

April 24, 2016    /    by

Will a Smartphone Replace Your PC?

Will you buy another desktop computer or laptop? Or, can your smartphone meet your technology needs? Should your business continue buying PCs? The IT infrastructure industry is divided, but the answer affects more than you think. Here’s why.

Shutterstock/Neirfy

READ MORE

April 17, 2016    /    by

Autism and Technology: What Can Governments Do?

April is Autism Awareness Month, and there are plenty of new developments to highlight. The number of private-sector initiatives is amazing, but can governments do more? What can innovative technologies do to aid early intervention for autism spectrum disorders? Currently technology is playing a significant role for adults with autism. That being said, should governments be doing more to hire and help these talented individuals with technical skills? Here’s my view.

April 10, 2016    /    by

7 Ways to Be More Innovative

You’ve probably heard the phrase “innovate or die.” But not everyone got the memo. So how does innovation really work in practical terms at the office? Regardless of whether you tend to be an innovator or protector, here are seven ways to help your business and career.

credit: Flickr/Boegh

READ MORE

April 3, 2016    /    by

Developing Government Cyber-Leaders

As the government pay gap grows larger with the private sector, where will the next generation of government cybersecurity leadership come from? What's the best background to enable success? Who should consider government cybersecurity roles? The public and private sectors are battling a growing list of global cyberthreats. With more data breaches, cyberattacks targeting critical infrastructure and new Internet of Things vulnerabilities, the competition for competent cybersecurity increases.

Shutterstock/Rawpixel.com

READ MORE

March 27, 2016    /    by

Ransomware Emergency: What Can You Do?

The rise in ransomware has taken a dramatic turn for the worse in 2016. Several hospitals recently declared states of emergency. Meanwhile, thousands of global businesses and consumers are now becoming victims of hacking attacks leading to extortion. This very serious situation requires the immediate attention of everyone from PC owners to small businesses to the large governments. Here’s the problem and what actions you must take now to protect yourself.

credit: shutterstock

READ MORE

March 20, 2016    /    by

Hacking March Madness: How Cybercriminals Exploit Popular Sports Events

We’re in mid-March, which means the NCAA College Basketball Tournament is in full swing. But there is more than one way to bust your March Madness bracket, and cybercrooks are also working overtime to grab a piece of the cash. Here’s how (and why) major sporting events are top targets for global hackers.

Credit: Shutterstock/SAJE

READ MORE