News
Articles from the CIO Council & Our Partners
Is Your TV Listening to You? Cyber Tips from a Chief Information Security Officer
The Nation’s response to the pandemic has highlighted that our society not only uses technology but is also profoundly reliant on technology in our daily lives.When new technology becomes available, we are often amazed and excited to incorporate it into our lives. However, that amazement quickly becomes an expectation for reliability, and the excitement turns to a yearning for more innovation. Yet, in our efforts to satisfy this drive for greater innovation, we often overlook the risks that come with deploying cutting-edge technology while sustaining what we already have.
FMG Publishes International Travel Guidance for Mobile Devices
The Federal CIO Council’s Federal Mobility Group (FMG) announces release of a draft report that presents in a handy reference guide the best practices and lessons-learned for the use of government-furnished equipment (GFE) such as mobile devices by federal employees on international travel. The public comment period extends to the end of December 2021.
We Need You – For Cybersecurity!
If you’re looking for meaningful IT work, cybersecurity is the place to be. Cybersecurity professionals help protect peoples’ finances, clean drinking water, traffic control systems, food supply chains, health information, and more. If you have the interest and aptitudes needed for a career in cybersecurity, I highly encourage you to give it a try…
National Cybersecurity Awareness Month : Phishing Attacks
October 1st marks the beginning of the 18th annual Cybersecurity Awareness Month. Once again, the Federal Cybersecurity Information Security Officer (CISO) Council is proud to reinforce its commitment to safe and secure online behavior. Remote work continues to be the ‘new normal’, and cybercriminals are ramping up their focus on this expanded attack surface. Phishing attacks have been on the rise for decades and cybercriminals seek to take advantage of weary workers. This method of attack continues to be one of the most dangerous threats to an organization because is the easiest way to deliver malicious or weaponized payloads.