Categories
Uncategorized

Phone Hacking

Phone Hacking  Phones are vulnerable to many kinds of hacking methods, and this can be especially problematic for your organization if your employees use their phones to access sensitive organizational information. There are many types of phone hacks to be aware of.  Phishing. The phishing method involves cyberattackers impersonating a trusted individual or company in order to gain confidential information. This […]

Categories
Uncategorized

Web Design and UX Design

Web Design and UX Design  UX refers to “user experience”, which is the experience a user has with a product or interactive media, such as a website. UX can be applied to many things besides websites that involve human interaction, such as toys, kitchen appliances, and 4D movies. UX design fails in products result in poor sales, diminished […]

Categories
Government Outsourced IT

Public Sector IT Modernization 

Public Sector IT Modernization  The public sector has long been feeling the dragging weight of outdated processes and technologies, but experiences during the pandemic have allowed these issues to finally receive the overdue attention that they require. The survey underpinning Deloitte’s “Seven pivots for government’s digital transformation” revealed that three quarters of respondents asserted that the pandemic accelerated their governments’ […]

Categories
Government Outsourced IT

Public Sector Remote Work Challenges

Public Sector Remote Work Challenges  The shift from in-person work to remote work during the pandemic was easier for some industries than it was for others. It is a surprise to no one that the public sector was not a leader in this transition. It is easy enough to dismiss this as an inevitability due […]

Categories
IT Security Outsourced IT

Employee Security Practices 

Employee Security Practices  Information system (IS) security is challenging for organizations of all sizes. A study by Sadok, et al. took a closer look at the disconnect between corporate IS security policies and actual security practices in small-to-medium-sized enterprises (SMEs)1. Many organizations of this size are reliant on information technologies and networked systems to support their business operations […]

Categories
IT Security Outsourced IT

Cybersecurity Incident Response Planning  

Cybersecurity Incident Response Planning   A cybersecurity incident response plan (or IR plan) is a set of instructions designed to help an organization prepare for, detect, respond to, and recover from network security incidents. Much like a disaster recovery plan designed for natural disasters, a cybersecurity incident response plan prepares your organization to respond to digital disasters. Significant incidents […]

Categories
IT Security

What is a legacy system?

Legacy System  The term “legacy” has long been used to connote possession of some charming artifact or privilege that has been handed down from generation to generation. In IT parlance, it means your IT equipment is outdated, and quite possible insecure. It is no surprise then, that the general advice regarding your legacy IT artifacts is to move on […]

Categories
IT Security

What is the NIST framework?

NIST Cybersecurity Framework  The National Institute of Standards and Technology (NIST) created the Framework for Improving Critical Infrastructure (CSF) in response to the Cybersecurity Act of 2014 (CEA) which called for a “prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls that may be voluntarily adopted by owners and operators of […]

Categories
Application Security IT Security Outsourced IT

Cloud-Based E-Health System Security 

Cloud-Based E-Health System Security  Cloud-based healthcare computing has become much more common as its advantages, such as scalability, collaboration with Artificial Intelligence (AI), and machine learning, are undeniably attractive. While there are many benefits, there are many concerns and challenges as well. Cloud-computing challenges for applications in healthcare include different types of management, technology handling, security […]

Categories
Government Websites

Alt Text for Web Accessibility

Alt Text for Accessibility  Images need alternative text (alt text). Alt text is primarily used by people who use screen readers to access websites, applications, and other software. People who use screen readers are usually visually impaired and their impairments could range from complete blindness or to having vision impairment significant enough that reading text on […]