4 Actions To Thwart a Cyberattack
What is the best protection against cyberattacks? Eliminate bad practices from your agency.
What is the best protection against cyberattacks? Eliminate bad practices from your agency.
It is somewhat a paradox that state and local governments are expected to be more transparent and more secure than ever before.
When the city of Reno launched initiatives to expand its economy and offset pandemic-related tourism declines, it relied on new technology: geographic information systems (GIS). Here’s what GIS do — and what lessons Reno has to share.
It’s not uncommon for the spend management process to look like employees carrying a pound of paper expenses from one building to another. You may see some obvious pain points here.
From the lobby to the living room, constituents are changing expectations about how they want to interact with their government.
When you engage with constituents or work with colleagues, you want to hear and be heard by them. But in the increasingly hybrid workplace, this can become more of a challenge.
Historically, parking enforcement officers used paper lists and checked license plates manually. Was that a zero or an O? You couldn’t be sure.
Securing IT systems can be a herculean task. The state of Oklahoma found a way to do it: Officials used a zero-trust cybersecurity model.
We spoke with your colleagues, current and former govies who are experts in the digital services realm. We wanted to know: Have they encountered resistance at work? And importantly, how did they overcome it?
Agencies often suffer from low approval ratings, lower than the private sector. So how can even behemoth agencies reinvent themselves? Paying more attention to experience management (XM) is a great start.
Notifications