Insider Insights

  • States must use data to drive modernization and strengthen security

    States must use data to drive modernization and strengthen security

    With intelligent, real-time insights from IT operations, agency leaders get a complete view of the enterprise allowing them to break down barriers to information sharing and innovation.

  • unified communications systems in the cloud

    Is your agency missing out on hosted voice benefits?

    When unified communications systems are hosted off-site in the cloud, agencies can achieve significant savings and boost worker productivity.

  • Modernizing emergency communications for the 21st century

    Modernizing emergency communications for the 21st century

    Unified, multimodal emergency communications can help municipalities share potentially life-saving information more efficiently and effectively.

  • How to improve government services delivery

    How to improve government services delivery

    To make citizen services more user friendly and efficient, agencies must change how they approach IT.

  • A winning ticket: How virtual technicians can improve IT support

    A winning ticket: How virtual technicians can improve IT support

    Advancements in virtual tech can reduce IT staff firefighting duties while delivering enhanced help-desk services to employees.

    Comments: 1
  • The grave risks of text messaging for public agencies

    The grave risks of text messaging for public agencies

    Many public sector organizations still have not set up policies to preserve text messages in the same way they save and manage emails.

  • Police are prioritizing the use of social media

    Law enforcement officials say social media is key for both outreach and investigatory purposes, a recent survey shows.

  • ransomware

    3 steps to keep ahead of a ransomware attack

    By protecting sensitive data, training staff to recognize threats and building a reliable response plan, agencies can ensure that a ransomware attack won’t create the ultimate crisis.

  • risk-based data protection

    Implementing a best practice approach to risk-based data protection

    A standardized and repeatable process for the IT department and the program managers allows for advice, guidance and review of security and privacy at every step of the process.

  • Cybersecurity’s next phase: Cyber deterrence

    Cybersecurity’s next phase: Cyber deterrence

    We can strengthen cyber deterrence by improving cybersecurity, employing active defenses and establishing international norms for cyberspace.

inside gcn

  • Getting roads ready for connected, autonomous vehicles (ShutterStock image)

    Getting roads ready for connected, autonomous vehicles