How to Avoid Bad Things Happening to Good Browsers
Learn how to create a secure space to roam the internet at your agency.
Learn how to create a secure space to roam the internet at your agency.
To understand how agencies can better tackle potential insider threats, we heard from Jay White, Director of the Security Services Division for the Mississippi Dept. of Information Technology Services, and David Geick, Director of IT Security Services DAS/BEST for the state of Connecticut. They suggested four tactics for increasing agency security from intentional or malicious… Read more »
Cybersecurity is embedded in government. It affects the way the average employee logs into their computer, accesses email, and even uses the internet. However, many employees are still behind in the cyber arena. So what security trainings should employees know about? What is good basic cyber hygiene for the workforce? And how should agencies explore… Read more »
This blog post is an excerpt from GovLoop’s recent guide, “Government Health IT: The Fight to Keep Public-Sector Data Secure.”
Because many agencies rely on tools that don’t meet current needs, the first step to operationalizing security is actually not to start implementing changes for the future. Instead, take the time to assess the current threat landscape of your agency related directly to your mission and its associated important assets, as well as the tools… Read more »
Test data management systems are critical for helping government healthcare organizations secure data and deliver the right benefits to patients, on time.
This blog post is part of a seven-part series reviewing the Acquisition Gateway and IT Category data, trends, expertise, and advocacy that GSA’s Office of Information Technology Category (ITC) organization offers to support other agencies’ missions.
Learn more about how cloud solutions are helping health care agencies accelerate modernization, adapt solutions to create healthy communities, and transform the delivery of care.
This blog post is part of a seven-part series reviewing the Acquisition Gateway and IT Category data, trends, expertise, and advocacy that GSA’s Office of Information Technology Category (ITC) organization offers to support other agencies’ missions.
Learn how you can efficiently update legacy systems in order to enhance cybersecurity at your agency.