Recommended reading

Innovation Is Overrated
Source: Psychology Today

Contrary to popular perception, employees are more successful in their jobs when they imitate rather than innovate.

That is one lesson drawn from a recent international computer tournament, in which people competed in a constantly changing game of survival. Researchers found that when things are in flux, “it pays to imitate successful behaviors, with just a little effort devoted to invention and experimentation,” writes Psychology Today blogger Alex Pentland.

The same principle holds true in the more mundane office environment. Studies have found that although some employees make it big by coming up with innovative ideas, most people succeed by copying the successful strategies of their co-workers.

“It even seems that imitation is built into our genes,” Pentland writes. “Our brains are wired to help us fit in to the culture around us, and when in Rome, we automatically and unconsciously begin to do as the Romans do.”

Better Security Through Encryption
Source: IEEE Spectrum

Encryption is often cited as one of the answers to cybersecurity woes, but it's a tough process for many of the smaller devices people now carry around — and tend to lose, along with all the sensitive data on them. Think laptop PCs at the Defense and Veterans Affairs departments, among others.

Putting encryption into the processors that run those devices would greatly simplify matters.

Fortunately, Intel recently announced it has come up with a process that would allow a random-number generator, which is the basis for encryption, to work on modern processors.

An IEEE Spectrum story quotes Greg Taylor, director of Intel's Circuit Research Lab, as saying that the new all-digital device can generate billions of random bits per second and is more random than analog generators, which means the encryption is even stronger.

Executives Are the Weakest Link
Source: InfoWorld

A recent article in InfoWorld states that the biggest threat to an organization’s cybersecurity resides in the executive suite.

Author Joan Goodchild quotes Jayson Street, a security consultant and chief information officer at Stratagem 1 Solutions, as saying that “C-level executives are the juiciest targets for criminals, and they are putting the company at serious risk.”

Street cites some familiar reasons: Many senior executives assume the organization’s security will protect them no matter what they do, and they’re keen to use the latest tech gadget, whether it’s been properly secured or not.

But one reason is rather surprising: Social engineers often try to compromise an executive’s home computer network by targeting family members’ online activities.

"If you've got millions of dollars at stake and you are doing corporate espionage and want to steal secrets or money, you don't go after your target only, you go after everyone in your target's network, too," Street said.

 

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • computer network

    How Einstein changes the way government does business

    The Department of Commerce is revising its confidentiality agreement for statistical data survey respondents to reflect the fact that the Department of Homeland Security could see some of that data if it is captured by the Einstein system.

  • Defense Secretary Jim Mattis. Army photo by Monica King. Jan. 26, 2017.

    Mattis mulls consolidation in IT, cyber

    In a Feb. 17 memo, Defense Secretary Jim Mattis told senior leadership to establish teams to look for duplication across the armed services in business operations, including in IT and cybersecurity.

  • Image from Shutterstock.com

    DHS vague on rules for election aid, say states

    State election officials had more questions than answers after a Department of Homeland Security presentation on the designation of election systems as critical U.S. infrastructure.

  • Org Chart Stock Art - Shutterstock

    How the hiring freeze targets millennials

    The government desperately needs younger talent to replace an aging workforce, and experts say that a freeze on hiring doesn't help.

  • Shutterstock image: healthcare digital interface.

    VA moves ahead with homegrown scheduling IT

    The Department of Veterans Affairs will test an internally developed scheduling module at primary care sites nationwide to see if it's ready to service the entire agency.

  • Shutterstock images (honglouwawa & 0beron): Bitcoin image overlay replaced with a dollar sign on a hardware circuit.

    MGT Act poised for a comeback

    After missing in the last Congress, drafters of a bill to encourage cloud adoption are looking for a new plan.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group