Category: Security

Federal Cloud Computing: Public or Private Cloud?

The Capital Beltway is 64 miles of interstate surrounding Washington, D.C. Shaped as a loop (hence the “belt”), the Beltway has an outer circle and inner circle and runs contiguously with other major interstates. Unless you’ve driven on it, you may not know that the highway is typically congested with never-ending construction projects, poor driving… Read more »

FedRAMP Risk Management Framework

Click the four areas on this infographic to see how FedRAMP has simplified the National Institute of Standards and Technology’s Risk Management Framework. Content loading… Please enable javascript!

Goodbye Passwords: Using Biometric Authentication for Your Business

Who isn’t concerned about hackers and internet safety these days? Many businesses have began exploring ways to reduce hacking incidents, like ending passwords with biometric authentication. This high tech authentication solution uses faces, fingerprints or iris scans for identity confirmation. An Increase in Biometric Scans in the Workplace With a rise in the number of hacking… Read more »

A Hitchhiker’s Guide to the Government Cloud

I’ve participated in many webinars about FedRAMP. The attendees often have many questions, as well as, significant concerns about what the federal program means for the future of their organization. From these I’ve learned that there are a lot of people in the industry that want to know more. So, I thought it would be best… Read more »

FedRAMP Compliance from a Project Manager’s Perspective

So you’ve just found out that your government agency is moving their portfolio to FedRAMP. Now what do you do? If you’re a project manager (PM), the answer can get a bit complicated; getting your organization on the right track to FedRAMP can often be a long and arduous process with lots of moving pieces.… Read more »

4 Tips for FedRAMP Cloud Provider Research

When it comes to cloud computing solutions for your company, there are thousands of service providers out there. However, you may find yourself needing a vendor authorized to operate cloud services for all or some federal agencies – in other words, a provider who is in alignment with and meets the strict federal standards of… Read more »

Atlassian Hosting: Advantages of using a FedRAMP-Authorized Provider

One of the most challenging topics any IT team might find themselves struggling with is Federal security compliance.  FedRAMP compliance is notoriously difficult to achieve. Layering on the complexity of supporting a development team who needs specific application support for their Atlassian dev tools can make this challenge seem impossible. That’s where a third-party hosting… Read more »

Sound Phishy? Legit VS Phishing Emails

On a daily basis, organizations and individuals are subjected to attempted phishing scams. With the constant barrage of malicious emails, it’s understandable why so many fall victim to ransomware or other malware. After all, occasionally you’ll find an email that looks authentic enough to win us over (who wouldn’t want to wire an advance fee… Read more »

Game Plan for Preventing Health Record Breaches

The healthcare sector was hit hard last year by data breaches according to the ITRC 2017 Data Breach Report. The industry incurred a total of 374 data breach incidents, representing nearly 25% of total breaches throughout the year. These statistics are unfortunate, but not surprising. Every other week we see another prominent health system falling victim… Read more »