e-Management brings commitment, expertise and proven success to every opportunity.
Solutions

Archive for the ‘IT Infrastructure’ Category

Cybersecurity is mostly about you…

Monday, March 28th, 2016

By Dennis Powell, e-Management

cyber attacks

Experts say cybersecurity is 90% YOU and only 10% technology. What are you doing to protect yourself from hackers?

Newsflash! There is no privacy on the Internet. I repeat: There is NO privacy on the Internet. Anyone with a web browser can see everything anyone has ever posted online! That’s according to the e‑Management Chief Information Officer (CIO) team (and numerous other cyber experts). Cyber experts say online security is 90% user and 10% technology. I know it sounds like a lot of responsibility. But securing the things stored on your Internet-enabled devices that are important to you (e.g., finances, pictures, intellectual property, work products, family stories) may be easier than you think.

Clearly, you should invest in anti-virus and anti-malware software or services. But that’s just 10% (technology) of the solution. The other 90%, remember, is you.  Here are a few simple considerations to help you protect yourself from hackers.

  1. Keep work and home separate. We are not talking about a work-life balance here. Keep your work and personal devices separate. Hackers will sometimes target you to steal valuable information about work projects or sensitive customer or client information. Oftentimes, the easiest way to hack a nonprofit, business, or government agency is through the organizations’ staff. Avoid using your smartphone for dual purposes, such as accessing your corporate enterprise network and visiting sites to download apps/games on the same device. Still, it may be best if you talk to your company’s  or agency’s information technology (IT) or cybersecurity team about  BYOD (Bring-Your-Own-Device) policies and best practices before accessing work products from home or downloading personal-use entertainment on business devices.
  2. Be mindful of online phishing and social engineering scams. You’re only human. And that’s what hackers are counting on. They prey on admirable qualities in people, including being helpful and trusting of others. Clever and “social” hackers employ tactics such as having chats with you while claiming to be someone you would normally trust. In reality, their intentions are nefarious—potentially tricking you into giving away clues and facts to obtain sensitive information. Similarly, phishing scam artists carefully craft e-mails and posts on social media sites like Twitter and Facebook. The phishing goal is to get you to click on links that launch malware, which downloads to your device and essentially gives hackers free range to your sensitive information and privacy. To protect yourself, never respond to online requests for personally identifiable information such as your full social security number. In addition, do not complete forms within the body of an e-mail message. And, avoid clicking on the links of sensational posts on social media sites.
  3. Avoid tricks that will hold your computer ransom. It’s true. Hackers have an arsenal of malware to infect your computer. Even your cloud files can be destroyed if you’re a victim to ransomware. That’s malware that holds your files hostage and demands payment for you to re-gain access. (As if the anti-virus subscription you paid for was not expensive enough). Hackers have even gone one step further with the encrypted CryptoLocker, which made ransomware headlines last year. How do you get infected? According to a Symantec blog posting, it’s the old enticing e-mail that you just gottah open trick AND then the ransomware infection downloads. The good news is that there is protection for malware/ransomware through security products like Symantec. Also, the e-Management CIO team recommends daily backups of your data to avoid the pain and inconvenience of losing or paying for access to your files.
  4. Get training. But before you sign up for a class, accept the fact that you are important enough to be a target for online predators. Next, take advantage of possible free training available to you. Several government agencies such as the Small Business Administration (SBA) offer free training. One best practice is continuous cybersecurity training. At e-Management, for example, we have a commitment to cybersecurity readiness. One of the first things our employees learn in the training is: There is the possibility that someone will deliberately or accidentally attempt to steal, damage, or misuse the data in our computer system(s).

Remember, online security is 90% user and 10% technology. By the way, if your company needs support figuring out where you may be at risk and what you can do to improve your level of readiness, do . We can help.

Knowledge is protection.

You get it. Cybercrime is on the rise and you have to do something to protect yourself from the cyber-crooks. The recently relaunched e-Management blog will focus on technology and cybersecurity, providing useful tips to help you navigate the ever-changing landscape of apps, policy, privacy protection, and consumer tech. So, (1) how do you protect yourself from hackers? (2) Does the organization you work for have clear guidelines around cybersecurity? (3) What are other consumer technology or cyber-focused topics you’d like for the e-Management blog team to tackle?

Maybe It’s Time We Do an “Energetic” Reality Check

Monday, January 9th, 2012

By Dennis Powell, e-Management

The Department of Energy through research and development at the National Renewable Energy Laboratory (NREL) is working to improve renewable energy technologies such as wind power that could lead to energy independence for the USA and job creation.

The Department of Energy through research and development at the National Renewable Energy Laboratory (NREL) is working to improve renewable energy technologies such as wind power that could lead to energy independence for the USA and job creation.

Pretty much everyone knows what the Internal Revenue Service (IRS), Environmental Protection Agency (EPA), and National Aeronautics and Space Administration (NASA) do. But how many of us really understand the role of the U.S. Department of Energy (DOE)? Recently, one prominent political figure talked about abolishing the Department. What’s interesting is the lack of protest from voters regarding the prospect of a country without DOE. Why am I so emphatic about the Department? Well, because the agency is here “to ensure America’s security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions.” In other words, DOE is responsible for energy policy including clean energy innovation, energy conservation, nuclear weapons program management, radioactive waste disposal, and so much more. Did you know that DOE developed the nuclear space power systems which powered NASA’s mission? But wait, there’s more…

Are you sick of the increasingly higher cost of fuel?
Well, I am and guess what? DOE is actually helping to make high energy cost a thing of the past. Did you know that DOE oversees the National Renewable Energy Laboratory (NREL)—the only national lab for the advancement of renewable energy and energy efficiency technologies. Renewable energy is clean and unlike other forms of conventional power, it never runs out. Renewable energy is great for the economy because it creates jobs and reduces our national dependencies on international sources of energy such as oil. Simply put, the work at NREL leads to commercial applications that may mean more sustainable, green energy that could save all of us money

Are you comfortable with radioactive waste being dumped in your backyard?
Probably not. It’s a good thing we have DOE’s Office of Environmental Management (EM) to keep us safe by cleaning up “the environmental legacy of the Manhattan Project and the Cold War.” Since the passage of the American Recovery and Reinvestment Act of 2009 (the Stimulus Bill or ARRA) by Congress, there has been a rigorous debate on whether the Stimulus worked. Well not only is EM’s disposal of radioactive materials vital to our safety, the program office has been highly successful in the implementation of Stimulus projects. According to EM, the program office advanced its “mission to clean up the waste generated during the Cold War, by reducing that footprint by 613 square miles.” Plus, EM ARRA-funded projects put thousands of Americans back to work while giving them new skills that may be leveraged in the future. Did I mention EM completed its ARRA-funded projects ahead of schedule and way under budget!?

Extending a helping hand to low income families.
Last week, DOE’s Weatherization Assistance Program announced how the Department is helping families save energy and money. Through this program, DOE has supported the weatherization of more than 750,000 homes of low-income families across the country. According to an article by April Saylor, online content producer, DOE Office of Public Affairs, the program reduced energy consumption up to 35% resulting in an average savings of $400 during the first year.

High-Powered Awareness Check.
DOE’s mission may be murky to some. But from where I stand, the Department’s activities are commendable and relevant. But this blog posting isn’t all about me; what do you think?  Should DOE stay or go? How important is energy independence to the future of the USA’s economy? What are you doing to conserve energy?

More than a few good…

Tuesday, November 29th, 2011

By Dennis Powell, e-Management

Every year, the Washington DC Veterans Affairs Medical Center provides top-notch care to more than 50,000 veterans, plus another 500,000 outpatients. The facility services veterans who live in the greater DC metro area. (Photo credit: U.S. Department of Veterans Affairs)

Every year, the Washington DC Veterans Affairs Medical Center provides top-notch care to more than 50,000 veterans, plus another 500,000 outpatients. The facility services veterans who live in the greater DC metro area. (Photo credit: U.S. Department of Veterans Affairs)

I grew up a little more than two miles from the Veterans Affairs hospital located on Irving Street in Northwest Washington, D.C.  The facility—which falls under the Department of Veterans Affairs (VA)—was responsible for treating many neighborhood veterans who were often full of war stories and who frequented the medical center. I admit that I was kind of jealous of these veterans; not because of their great adventures, but for their access to that “big hospital down the street.” As a kid, I had an obsession with hospitals. (Today, I try to stay as far away from them as possible! Go figure.)

My How Times Have Changed.
Over the past decade, the VA, which runs the VA hospital and serves our veterans, has come under fire. Remember the missing laptops and subsequent security breaches? Allegations of nepotism? The HIV and hepatitis issues linked to contaminated colonoscopy equipment?  Or maybe you may recall alleged inappropriate behavior among married executives?

Scandals come and go in the government that’s for sure. But in my opinion, what remains consistent is that most federal workers take their roles as civil servants seriously—especially at the VA. So, I decided to shine the spotlight on the VA and how it makes veterans and their families a little better.

Four Things that Make Veterans Affairs Great!

  1. Government Support for Our Veterans. Contrary to some of the bad press the VA has received, the U.S. government financially supports its veterans. The department has the 2nd largest federal budget. (In case you are wondering, the Department of Defense [DoD] has the most funding). The department serves our veterans through three administrations: the National Cemetery Administration (NCA); the Veterans Health Administration (VHA); and the Veterans Benefits Administration (VBA).
  2. Taking Care of Our Veterans’ Healthcare Needs. The VHA is responsible for administering healthcare to our veterans. This agency runs medical centers across the country and conducts medical research among other medical activities. The VHA is the largest healthcare system in the country! According to agency statistics, more than 53,000 healthcare professionals serve more than 8.3 million veterans annually.
  3. Benefits for the Entire Family. Through VBA, veterans are eligible for a list of benefits such as G.I. Bill for educational and special training assistance, housing loans, and insurance.  For instance, veterans who qualify for G.I. Bill benefits can actually get assistance for apprenticeships, on the job training, and college/university education. Better education and training may lead to better jobs and financial security. Check out the G.I. Bill website for inspiring stories regarding how the agency helps veterans and their families meet educational goals and securing financial success.
  4. Laying Our Veterans to Rest. The VA also honors veterans through burials and memorials. Did you know the NCA maintains “131 national cemeteries in 39 states (and Puerto Rico) as well as 33 soldier’s lots and monument sites?” Last year alone, more than 8.1 million people visited VA cemeteries. The government has “obligated more than $438 million” for cemetery expansion since 1980. But before you bark at that sum, keep in mind that volunteers gave 366,000 hours to support our VA cemeteries during fiscal year 2010 according to the NCA!

Is the VA perfect?
Absolutely not, given a few missteps of the department and its agencies. However, no agency is flawless. I shared my thoughts regarding the services and benefits the department offers our veterans.  Now, I want to hear from you. What are your impressions of how well the VA serves our veterans? What are veterans saying about the VA? In addition to services outlined in this blog posting, what has the VA done to support our veterans?

Going Green Is Easier Than You Think! (Part I)

Tuesday, January 18th, 2011

Grant Sewell, e-Management

Going green is more than turning off lights. It helps to reduce energy consumption and greenhouse gas emissions, which in the long run can save you and your organization the other green (money).

Going green is more than turning off lights. It helps to reduce energy consumption and greenhouse gas emissions, which in the long run can save you and your organization the other green (money).

“Going Green” is an important part of business for any technology operation these days. Recently, we have implemented a number of strategies in my office to help answer questions. But the truth is, many people only know the buzzword, and not the concepts that define it. In our 2009 blog, “Is Green the New Black?” we gave an overview of benefits of green operations for businesses, as well as a number of resources to find out more information. In this thread, I’m going to focus on what green means to information technology (IT), the important areas on which to concentrate, and some of the strategies that will yield the highest return on investment (ROI).

Green IT is More than Turning Off Lights
Many people look at implementing green policies as actions, like turning off lights when leaving an office, or enabling power saving features on a computer. In fact, that’s just one part of a larger process. Environmentally sustainable computing methods are joined in a lifecycle:

Design: Simple designs, non-proprietary parts, and efficiency certifications such as TCO  ensure that products can be used and maintained more productively in the workplace.

Manufacturing:  Technology that is built with recycled or less hazardous materials yield a more environmentally-friendly product. Studies estimate that manufacturing accounts for 70 percent of the natural resources utilized in the lifetime of a computer.

Usage: Configuring computer systems, printers and other peripherals for optimal efficiency during operation can save a company more than 25% in power expenses alone.

Disposal: Appropriately recycling or disposing of equipment at end of life ensures that the overall ecological footprint is reduced, such as landfill reduction and equipment re-use and re-purposing.

If you’re just getting started, you are probably not just going to throw away perfectly good, working equipment to buy something new and shiny – and that’s okay. A lot of the initial changes will be made in the “Usage” and “Disposal” phases, but too many organizations overlook the impact they have when selecting what to purchase.

Fact vs. Fiction
The concept of Green IT began in 1992 when the EPA and the U.S. Department of Energy launched Energy Star, a program designed to reduce energy consumption and greenhouse gas emissions. As technology has advanced, companies are realizing they can do just as much (or more) with less. Let’s debunk some popular myths:

Green hardware isn’t powerful enough: Using less power doesn’t mean you have to sacrifice performance. Using technologies like solid-state drives (SSD) and high efficiency power supplies will reduce power consumption and increase performance.

It won’t make a difference:  Technology represents 4 percent of the overall power consumption in the United States. Implementing green procedures can save you money, reduce management requirements and promotes a responsible image of your organization.

It’s more expensive: Okay, this one may be true – kind of. Many green technologies will burn a hole in your pocket (initially), but don’t rule them out before you see how they will benefit your budget and decrease in costs over the long run.

It’s too much work: The changes don’t have to be dramatic to make a difference. In Part II, I’ll highlight options that won’t take much manpower.

Your Thoughts?
Please be sure to stop by next week for the final installment (Part II) of this Green IT blog series, when I will discuss how you can get big results, with little effort.

In the meantime, we want to hear from you. What has your organization done to “Go Green?” Do you have other strategies to share? What actions were the most beneficial? How critical do you think “Green IT” will be in the next 5 years?

iPhone, BlackBerry, and Android. Oh My!

Tuesday, July 13th, 2010

By Dennis Powell, e-Management

Before I purchased my Android smartphone, I could live definitely without smartphones. Today, not sure so much. What would I do without my movie show time app, my GoogleMap app, GPS, YouTube, Gmail, touch screen…and you know I could go on; but, I will spare you my app-obsession.

What would happen to your personal data if you lost your mobile phone?

What would happen to your personal data if you lost your mobile phone?

Whether you like it or not, smartphones are everywhere. The fascination with these convenient devices isn’t limited to my fixation. Remember the long lines for the release of the iPhone 4? Not surprising if you consider CommScore’s most recent estimates that more than 234 million Americans (ages 13 and older) are mobile subscribers. Among that number, more than 42.7 million people own smartphones.

Meet the Jetsons
Smartphones such as the iPhone, Android, Palm, or BlackBerry offer 21st Century convenience reminiscent of the classic TV show, The Jetsons. (Personally, I have never seen this show since I just celebrated my 21st birthday again for the 20th time. :-) ) But seriously, as a kid growing up, I never thought I would be able to use a futuristic device to get or store phone numbers, birthdays, or find my way to the closest dry cleaner or novelty shop in a city I have never visited. And yet, here we are—a future not much different from the videophones of The Jetsons.

Technology is great. Right? And, no one doubts if smartphones are good for us. But, if used improperly, they can easily become liabilities. Here are a few security tips that should keep you and your organizations safe from smartphone predators.

Don’t Lose It
A few months ago, I lost my mobile phone and I totally lost my mind. I panicked because so much of my life was housed in the phone. Lucky for me it was in the seat of my best friend’s SUV. Plus, I didn’t have sensitive data connecting me to work or home. Personally, I avoid having my social security number, credit card digits, notes regarding passwords, or financial data on my mobile device. Along with those best practices, be sure to back up data on your home computer, authorized and approved work computer, or in the cloud (online data storage services)—just in case you’re “unlucky” like me when it comes to mobiles devices. (Click here to read a link to Gizmodo that provides easy ways to back up your smartphone).

Keep in Mind Passwords Are Your BFF
So let’s say you are “unlucky” and lose your phone. What then? Well, you may be better protected if you have a password in place that allows access to your device’s information. Seriously, passwords are your best friends forever (BFF). Some smartphones use alphanumeric codes to grant access to users. Others, such as touch screen devices, may require patterns to unlock smartphones. Be sure to have a strong password or code to gain access to your phone. For alphanumeric best practices, check out Doug Pitcher’s blog posting that addresses creating strong passwords.

There’s a Scam for That!
All of the security issues you have with your laptop and/or desktop are relevant when it comes to your BFF…oops, I mean your smartphone. And while there are fun commercials claiming that “there’s an app for that,” buyer beware. If you plan to download apps, be sure to use the same caution you would with your personal computers. Specifically, avoid unfamiliar third party apps—especially the free ones from anonymous developers. These rogue apps could be spyware or malware that have the power to steal valuable personal information or even hack into your work network. Similarly, avoid clicking links included in text messages to unknown sites, or coming from strange sources. The Internet is loaded with con artists trying to take over your identity or steal your organization’s or company’s intellectual property, secrets, or workers. And yes, there truly is a scam app for that!

Have Your Smartphone Validated by Your Office Security/IT Team
Even company and government agencies are trying to figure out how to secure their sensitive data with smartphones, which are essentially minicomputers connected to IP networks. To reduce the risk of compromising your work network, be sure to have your smartphone approved by your organization if you plan to access its network. At the very least, you should use secure connections (e.g., VPN) to access company resources. Ask your security/IT team about using encryption technology to safeguard sensitive, confidential, or proprietary data.

Don’t Even Think About Jailbreaking
Some iPhone users aren’t happy with their exclusive mobile carrier. (True story.) So, they “jailbreak” or hack their own phones in order to take advantage of another mobile network. Unless you are a credentialed cyber security professional, jailbreaking may open your smartphone up to serious security issues. We advise you to find another smartphone that works on your network of choice. Hacking your phone is “not a good look.”

Time for you to chime in…
We want to hear from you. Have you ever lost your smartphone? If so, how did it affect you? Are smartphones overpriced toys? What smartphone is the best for security? Why? Do you have any smartphone security tips you would like to share?

Feel free to comment and/or share this blog thread with your social networks (e.g., Twitter, Facebook, Digg, Google, MySpace, LinkedIn).