Media Center

NJVC welcomes interest from prospective employees, partners, and customers.

Visit our LinkedIn page to get more information on how you can join our next job fair or view our next product demonstration. To reach our recruiters directly, please visit our careers site or contact us.

White Papers

NJVC’s Subject Matter Experts (SMEs) are a tremendous resources of information and can share their knowledge with you. Some of the work NJVC does is for clients in the intelligence and defense communities, and we cannot talk publicly about our project work without our customers’ permission. Below are white papers created by our highly regarded SMEs, if you have any questions, please contact us for more information.

Insider Threat White Paper Cover Screen Cap
In cyber security, threats abound, system vulnerabilities are numerous and news of data breaches are as common as thunderstorms in summer
Generating Security Metrics Cover Full
Detecting and responding to cyber security threats is an extensive challenge for all IT organizations regardless of their industry. Simply put, protecting all the valuable online assets of an organization is difficult even with the multitude of modern controls available. Physical security concepts have built up and matured over literally thousands of years, whereas the digital realm has only existed since dawn of the computer age in the 1940s and 1950s.
Securing Online Accounts Full Cover
Online accounts are a hallmark of modern digital life. So why are they so poorly secured? NJVC Cybersecurity Principal Robert J. Michalsky explains the challenges in securing online accounts, why current solutions are failing and why the future remains bright for digital ID management.
Screenshot 2020 12 21 Cyber Security Awareness in Healthcare pdf
Healthcare professionals should rightly be focused on providing quality healthcare services to patients. Does that mean that the industry should ignore a non-related technical topic, such as cybersecurity? Hardly, if the data breach history captured by the U.S. Department of Health and Human Services (HHS) is any indication. Data breaches are rampant and increasing in size and frequency.
Screenshot 2020 12 21 Cyber Security for Healthcare White Paper Protecting Digital Health Information What to Do pdf
Protecting all forms of digital health information, including personal health information (PHI), wherever it is contained across an enterprise, is one of the fundamental objectives of every healthcare organization. As mandated by the Health Insurance Portability & Accountability Act of 1996 (HIPAA) privacy and security rules, appropriate physical and logical safeguards must be in place to effectively enforce controls on PHI at rest, in transit or in use.
Screenshot 2020 12 21 Cyber Security for Healthcare White Paper Protecting Digital Health Information What Is at Stake pdf
As healthcare organizations transition from paper to electronic health records, an enormous opportunity exists to improve healthcare delivery through greater data transparency. For instance, cross-referencing prescriptions can identify potential drug interactions and improve patient outcomes. Such advances, however, bring along an enormous increase in the possibilities for breaches in privacy and security—particularly with unsecured end-user devices, such as smart phones. Health IT leaders must balance the needs of their stakeholders for relevant and timely information with mandated compliance requirements and the total cost of operating and sustaining their systems securely.
Screenshot 2020 12 21 Cyber Security Healthcare Protecting Digital Health Information Where to Start pdf
Healthcare provider organizations everywhere are evolving patient health data access and management, making personally identifiable information (PII) more digital, mobile and available. With this move comes a quantum increase in the exposure of individually identifiable information within the enterprise and across the extended value chain. The balancing act is to address the need to be agile and responsive to stakeholders, and therefore more competitive, while managing the risk of compromised security with consistently dwindling budgets.
cyber security whitepaper analytics importance
The current state of cybersecurity has been largely defined by two major factors—an evolving threat landscape, and the various regulations that have been put in place to combat those threats. The amount of sensitive information that is currently available has been increasing exponentially, and will probably continue to do so.
whitepapers managed desktop infrastructure
The benefits that a Virtual Desktop Infrastructure offers an organization cannot be realized by simply building virtual machines. As with managing traditional desktops the overall sophistication of management of the VDI environmentdetermines the savings. NJVC has constructed a holistic VDI offer: the Managed Desktop Infrastructure (MDI)—a combination of VDI and the management of the VDI environment that enables a streamlined process for migrating and maintaining the operating system, applications and the user persona between devices in this environment.
Ipv6 whitepaper
The entire Internet protocol version four address space provides approximately 4.3 billion unique IP addresses. With a current world population of more than 7 billion, that is not enough for even one IP address per person. Since individuals today use multiple methods, such as mobile phones, iPads and laptops, to access Internet content, the number of unique IP addresses required per person has increased significantly. Even more compelling, however, is the proliferation of IP addresses for ubiquitous use in mobile devices, household appliances, automobiles and sensors.
CloudComputing Risks
In response to recent trends in federal information management to move towards cloud computing the Intelligence and National Security Alliance convened a working group to study the mission impacts of cloud computing on the Intelligence Community (IC). The Cloud Computing Task Force collected and analyzed data through a concerted effort in which two groups conducted over 50 interviews with thought leaders and policy makers in the public and private sectors.
CloudComputing in Federal Agencies
Cloud computing is a game changer. The value of the new approach of cloud computing to the provisioning and consuming information technology lies within its ability to enable more efficient and effective information sharing. Its merit is not just in cost savings, but in enhanced mission and business enhancements and improved allocation of resources. Its characteristics not only dramatically transform how an information technology infrastructure is managed, but also the traditional roles of enterprise IT professionals to a more service management orientation—as they become responsible for helping their internal customers better use the externally provided IT services. Building a cloud computing roadmap is essential to unlocking the value of the cloud in a predictable fashion with acceptable risk. This paper outlines the essential steps to constructing a solid cloud computing roadmap
Economic Benefit of Cloud Computing
Cloud computing, as defined by the National Institute of Standards and Technology, is a model for enabling “… convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” NIST is implying the economies of scale that go with cloud computing when it refers to a pool of configurable computing resources.