Defining the Internet of (Government) Things

The Internet of Things, or IoT, is a system of interrelated devices that may have completely different uses, shapes, or sizes, but all have one thing in common-- data and the ability to transfer it autonomously. IoT can be the microchip that helps you find your lost dog, a monitor in a heart valve that alerts doctors and patients to irregular beats, a thermostat that you can turn on remotely, motion detectors that tell you when someone is approaching your door, and so much more. Building on these everyday applications, state, local, and federal agencies are finding ways to use IoT to better serve citizens.[Tweet "IoT was named one of the top subjects discussed at federally-focused events. #GovEventsBlog"]

Since IoT was named one of the top subjects discussed at federally-focused events, we wanted to take a closer look at how government organizations are tapping into the plethora of IoT devices, networks, and capabilities to improve our country's security and welfare. The major trends around IoT in government include:[Tweet "The major trends around IoT in government include: Smart Cities, Cybersecurity and more. #GovEventsBlog"] Continue reading

19 Actionable Steps to Protect Online Privacy – Part 4 of 4

From time to time GovEvents will come across information we feel our members and audience would benefit from. Here's something we wanted to share:

  1. Consider not using Google

This goes not only for the main Google search engine but also all of the other tools - Google Analytics, Gmail, Google Apps, Google Drive, etc.

Due to its huge network and portfolio of tools, Google knows basically everything about you there is to know. Whether you're comfortable with this from an online privacy point of view is up to you.

When it comes to the main search engine, DuckDuckGo is an alternative worth considering, or even Bing (but then we're back in camp Microsoft).

As for things like Gmail and Google Drive, there are multiple viable solutions on the web. For example, SpiderOak is an interesting alternative to Google Drive and Dropbox that even has Edward Snowden's approval.

  1. Probably delete Facebook from your phone

There have been multiple stories appearing lately describing Facebook's alleged "in the background listening" practices. Some people are reporting concerns related to the Facebook app listening on to the conversations they're having over the phone and then suggesting ads based on the things mentioned in those conversations.

In all likelihood, or at least we'd like to believe so, this is not entirely plausible - and Facebook obviously denies. However, getting rid of the Facebook app from your phone surely won't hurt your overall online privacy.

Continue reading

19 Actionable Steps to Protect Online Privacy – Part 3 of 4

From time to time GovEvents will come across information we feel our members and audience would benefit from. Here's something we wanted to share:

File shredder by Dr. CleanerOnline privacy is a topic that grows in importance every single year. With more and more web services, connected apps, and even home assistant devices that are gaining in popularity, it's now more crucial than ever to understand what the dangers to your online privacy are and how to protect it consciously.

This online privacy guide is all about that.

Here are 19 actionable steps to help you remain anonymous on the web and protect your online privacy. No sophisticated computer knowledge required.

  1. Update to a newer mobile device

It seems that every year companies like Apple, Samsung, Google try to convince us to buy the latest smartphone and toss our old ones away. Naturally, we resist. But we can't resist forever. At least not if we don't want our online privacy to take a hit.

What we need to remember is that modern mobile devices are computers. Just like your desktop PC or Mac, but only slightly less powerful. Therefore, they're also prone to various security threats, and just like any other device, they require constant updates to stay secure.

New devices are being updated constantly, so that's no problem. Older ones, not so much.

For example, Nexus 7 - a device that's still relatively popular (you can buy them on eBay right now) stopped getting security patches after June 2015. This means that whoever's using it has been left on their own and exposed to new security threats for more than two years now.

Whether we like it or not, at some point, a new device is unavoidable. Continue reading

Government Event Market Remains Consistent

Last month we surveyed GovEvents' organizer members to get a pulse on what they are seeing in the government events' market. The common theme we found is that the environment for government events seems to be stable and unchanging.

This is good news in the wake of the GSA event scandal that dealt a big hit to the government events' market in 2012 and 2013, but should we get comfortable with this status quo? First, let's look at some of the stats:

  • 61% of respondents said they are planning the same number of events as they did a year ago.
  • 42% of organizations said they are spending the same amount of money on events as they did last year.
  • 57% of respondents said that attendance at events is about the same as it was a year ago with 29% noting a rise.[Tweet "GovEvents Survey Findings: Government Event Market Remains Consistent. #GovEventsBlog"]

These findings were similar to those discovered by Market Connections earlier this year. In that survey of government employees, the results showed that event attendance continued to be flat for the last couple of years after seeing an uptick after the issues around the GSA event were addressed. Continue reading

The Secret is in the Cloud

Amazon Web Services (AWS) recently announced a newly developed "secret region" in their cloud, specifically made to host federal data up to the secret level of security classification--the second-highest level behind top secret. Amazon had previously offered only a top secret region, but this new offering now allows for any sensitive data to be stored in the commercial cloud. According to Amazon, "The U.S. Intelligence Community can now execute their missions with a common set of tools, a constant flow of the latest technology and the flexibility to rapidly scale with the mission." Microsoft Azure also has a similar offering.[Tweet "AWS newly developed "secret region" in their cloud to host federal data. #GovEventsBlog"]

The government's adoption of cloud technology started with administrative and low-risk data and applications - service workflow solutions with Salesforce, email platforms, and video conferencing. As evidenced by the work put into securing the cloud for sensitive data, commercial cloud providers see a need and profitable revenue stream with government customers. Continue reading