Results 61-70 of 98

4 Cyber Threats Your Agency is Overlooking in 2013 (And Why You Need to Address Them Now)

August 10, 2012arrow Cyber attacks represent the next frontier of both crime and warfare. Agencies are dealing with increasingly sophisticated cyber attacks that are growing at an alarming rate. In all the commotion to counter cyber attacks, however, some threats are being overlooked.

Tidying Up: What Reorganization Can Do For Federal Agencies

July 25, 2012Underwritten by arrow Driven by budgetary constraints and Administrative priorities, federal managers are considering reorganization to increase effectiveness at the agency and program levels. Reorganization of any kind can complicate daily operations and generate uncertainty among the workforce, creating difficulties for today’s federal manager. In this industry insights report, GBC assesses the attitudes and knowledge of federal employees regarding potential reorganizations and consolidations.

Health Information Exchange: Improving the Bottom Line, Better Patient Care

July 17, 2012Underwritten by arrow The U.S. banking, post-secondary education, and law enforcement sectors all take advantage of a shared network of electronic records, but the healthcare sector has yet to follow suit. Why is a health information exchange strategy so important? By connecting various sources of medical records, a system of health information exchange (HIE) can improve public health outcomes and reduce redundant spending. Read on to learn: • How expanding access to data can improve citizen services • What HIE data can do for biosurveillance and disease prevention • How the Virtual Lifetime Electronic Record Initiative is improving military healthcare • Which agencies are leveraging HIE data to reduce waste, fraud and abuse.

Five Desktop Virtualization Myths Debunked

July 10, 2012Underwritten by and arrow A lot has been published in the past few years on desktop virtualization. Despite this, many virtualization rumors and myths still persist. Here are five of the most common myths, and the real truth behind them.

Errant Apps: Is there an app for that?

July 10, 2012Underwritten by arrow In the 21st century, new programs and initiatives are increasingly reliant on sound information technology. If an application crashes, there are severe programmatic consequences. In light of this problem, agencies can greatly benefit from third party monitoring.

When Evolution Drives Revolution: The Cloud as a Business Model

July 9, 2012Underwritten by arrow Evolving Information Technology (IT) is driving a revolution in the business of government. Both government and the businesses that support it are constantly discovering new ways to accomplish the work they have been doing. At the same time, new capabilities are allowing managers to make new demands of technology and to envision new goals that they could not have imagined only a few years ago.

Four Reasons Why More Agencies Are Adopting Virtualization (And Yours Should Too)

June 12, 2012Underwritten by and arrow In the past two years, federal IT managers have been given a significant mandate to improve agency IT operations. Processes need streamlining, projects need reduced overhead costs, and agencies need quicker deployment times. A growing number of federal departments – from the Department of Defense to the Department of Energy– are deploying desktop virtualization.

Keeping Up: Equipping Agencies to Meet Mobile Needs

June 7, 2012Underwritten by arrow Increasing mobile technology options offer a way for federal employees to cut travel and commuting costs and increase productivity, but are agencies making the most of it? Tablet usage has tripled and laptops are quickly replacing desktops in Washington, but 64% of federal employees say agencies are not meeting their mobile needs. Read this GBC report to learn: • Current mobility trends • The top challenges agencies face in expanding mobile options • How mobility can enhance your work experience

Continuous Monitoring: Real-time Testing and Validation of Security Measures

June 5, 2012Underwritten by arrow After Congress re-wrote the Federal Information Systems Management Act (FISMA) in 2010, it gave all federal agencies a deadline of September 30, 2012 to implement continuous monitoring software into their network security portfolio. As cyber attacks continue to grow, reaching a new high in 2011 according to OMB, federal agencies need every bit of leverage they can get in cyberspace. Read this Government Business Council report to learn: • How your agency can use continuous monitoring to address known vulnerabilities and discover new weaknesses • Why the Obama administration listed continuous monitoring as a top priority in FY2011 • Options to implement continuous monitoring at your agency

Technology Tackles Waste, Fraud and Abuse

May 30, 2012Underwritten by arrow According to the Government Accountability Office (GAO), a full 5.5% of all government payments are improperly distributed. Add to this the many other incidents of fraud and abuse and the federal government is dealing with a serious fiscal issue. However, technology can help fight against the waste, fraud and abuse that agencies battle on a daily basis. Read this exclusive Government Business Council report to learn how technology has: • Helped the IRS with fraudulent tax returns and unpaid taxes • Confronted the DoD egregious problem of waste • Battled the huge amount of fraud facing Medicare