This message was sent to ##Email##
By Ross Lancaster
A little more than two years ago, the Federal Communications Commission adopted its Open Internet Order, which guaranteed net neutrality for internet users, but also controversially regulated the internet as an effective utility under Title II of the Telecommunications Act. Now, it appears those rules are set to come to a quick, albeit somewhat expected, end. At a recent event in Washington, FCC Chairman Ajit Pai announced his plan for rolling back the Open Internet Order.
"The best way to predict the future is to create it." ~Peter Drucker.
GMIS, together with Corporate Members like SHI, Commvault, Pure Storage and others, are creating a bright future for GMIS by forging new and stronger relationships between GMIS Agency Members and the companies that provide the tools they need to be successful. Because of Corporate Members like these, we can confidently predict that GMIS will continue to do great things!
To be sure our predictions for greatness are realized, we need to continue growing these relationships between GMIS and our Corporate partners. Your participation is a key component of this growth. If you are an Agency Member, talk to your Corporate partners about GMIS and share with them how important GMIS is to you. If you represent the Corporate sector, reach out to GMIS and find out how you can become a Corporate Member of GMIS International.
Here are some of the many benefits of Corporate Membership:
Corporate Membership — $2,500/year*
*Dues for companies with less than 25 employees or $2 million in annual revenue are $750/year for Corporate Membership.
Data Dive = IT Benchmarking & Metrics
- Private login to view the GMIS International (GMIS) Membership Directory of CIOs/IT Directors.
- Access to Corporate Forums with Members
- Receive monthly email from HQ to Members via Listserv
- First right-of-refusal for all Conference Sponsorships/Exhibits
- Opportunity to be Featured as the "Member in the Spotlight" in the GEM and on the website
- Listing in the Membership Directory
- Corporate Profile on the website
- External links to the Corporate Websites
Share Corporate Knowledge with Members
- Gain valuable insights related to IT benchmarking and metrics based on data provided by GMIS Members from across the United States.
- Data Dive provides your company real-time access to public sector IT demographic, budget, inventory and planning data.
If you are a GMIS International member, contact your vendors and let them know about this valuable opportunity. If you are a vendor and would like to become a Corporate Member go to www.gmis.org/page/CorpMembs and register.
- Submit Board-approved surveys to members
Michael Leiker — 2nd Vice President
With industry-leading components from Cisco and Pure Storage, FlashStack is a powerful, efficient, and evergreen converged infrastructure solution that will shorten your time to value and deliver serious ROI. It scales, without disruption, as your needs grow and provides a powerful and reliable platform.
Watch the video to learn more!
Did you know that GMIS International has a platform for members, corporate members, and state chapters to disseminate information to more than 6,000 IT minded people and organizations?
Through the past year's efforts by the Marketing Committee, we have introduced a new, responsive website that includes integration with Hoot Suite enabling distribution from the news feed into all the social media outlets.
Any member who wants to tout their latest accomplishment, or share your event details with others is welcome to use the news feed.
Please feel free to use this capability as a tool to lift up that employee needing a "Way To Go!," or an entire team who has done exceptional work on a project or support issue. Feel free to use it to show leadership that others are impressed with your (and your leader's) accomplishments.
Chapters and Affiliates: Tell us about your upcoming events and let GMIS International help with your marketing efforts — for FREE!!
All of this is yours for the taking as a benefit of your GMIS Membership. Try it today!
Not a GMIS member?
These scams continue to proliferate at alarming rates and are becoming more and more difficult to detect. It's important for you to understand how to recognize
a phishing attempt and what you can do to protect yourself.
What Can I Do?
- Be cautious about all communications you receive.
- If it appears to be a phishing communication, do not respond. Delete it. You can also forward it to the Federal Trade Commission at email@example.com.
- Do not click on any links listed in the email message and do not open any attachments contained in suspicious email.
- Do not enter personal information in a pop-up screen. Legitimate companies, agencies and organizations don't ask for personal information via pop-up
- Install a phishing filter on your email application and also on your web browser. These filters will not keep out all phishing messages, but will reduce the numbers of phishing attempts.
|April 30 - May 4
||Georgia GMIS — Spring 2017 Conference.
Jekyll Island, GA
||KS-GMIS Quarterly Meeting – Manhattan
Small Business Trends
For the majority of small businesses, the end of tax season brings a sigh of relief. But don't let your guards down just yet. A new threat surrounding W-2 fraud has been detected, increasing the concerns over tax-related scams at this time.
W-2 forms contain all the information that identity thieves are looking for: full names, addresses, identification numbers and more. Cybercriminals understand this, so they create elaborate plans to get their hands on them.
Luckily, Barracuda, the cyberrisk experts, exposed the threat recently in a post on the company's official blog.
As pressure mounts on Republicans to overhaul the Affordable Care Act, blockchain advocates are hoping bullish modifications to the law could provide a springboard for the adoption of distributed ledger tech.
Since the 2009 passage of the ACA, the U.S. healthcare system has continued to grapple with the escalating spending, inefficiencies and antiquated systems that prompted calls for reform in the first place.
Now, President Donald Trump and Republicans in Congress are seeking to repeal and replace Obamacare with a new plan, dubbed the American Health Care Act, which they deem to be simpler and more consumer friendly.
Integrating enterprise robotic technology into existing IT systems will be different for every industry — and a new challenge for CIOs. Read about how to get the job done.
In 2016, targeted cyberattacks pivoted away from economic espionage to politically focused subversion, which may not sound immediately alarming to public agencies at all levels — but in their tactics, criminals showed an increased reliance on emails and common IT tools, a new report reveals.
The Symantec 2017 Internet Security Threat Report released April 26, draws the eye back to a year punctuated by Distributed Denial of Service attacks, attempts to subvert the American electoral process, multimillion dollar bank heists, a rise in ransomware predations and the revealing of cracks in the cloud environment.
By Bambi Majumdar
Cybercrime is on the rise. While we are not surprised by the fact, the rate at which it is increasing, the sophisticated technologies used by the perpetrators and the inadvertent complicity from telecom sectors have raised additional concerns. Montana recently became the latest state to join Minnesota and Illinois to secure the rights of their online citizens. But it's not just the U.S. that is feeling this need to intensify their cybercrime-fighting forces.
Congress has tried for years to pass legislation to make the Pentagon a smarter buyer of technology. So when members of the House Armed Services Committee met recently with Eric Schmidt, chairman of Google's parent company Alphabet, what they heard gave them pause.
If you're like most Americans, you have a few gift cards in your wallet right now. I have two, one has a snowman on it. In 2015, the average holiday shopper purchased two gift cards, and the total volume of gift card value is expected to reach $160 billion by 2018, according to Gift Card Granny.
Despite being great presents for many, prepaid gift cards can be a bullseye for fraud and money laundering. With tighter post-financial crisis regulation on larger amounts of money, and safer chip-enabled debit and credit cards, fraud has "shifted to the less valuable avenues — or at least previously less valuable," says Stephen Ufford, CEO of Trulioo. "
About four in every five (77%) of all detected ransomware globally was in four main sectors — business and professional services (28 percent), government (19 percent), healthcare (15 percent) and retail (15 percent), according to NTT Group.
NTT's 2017 Global Threat Intelligence Report found that while technical attacks on the newest vulnerabilities tend to dominate the media, many attacks rely on less technical means.
Read It Quik
Cybersecurity is an ongoing concern, with the number of threats rising in 2016. Ransomware, distributed denial of service, IoT threats and cloud application threats — a number of emerging threat scenarios have begun to loom large, as we see an increasing pervasion of technology into our lives. Symantec recently published its annual Internet Security Threat Report, which provides companies with useful insights into the threat landscape. Not only are these new threats rising, but traditional threats are also becoming more prevalent. In this scenario, companies must fortify their threat detection and addressal mechanisms to stay cybersafe.
7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063