[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-local-government-and-cloud-services\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-local-government-and-cloud-services\/","headline":"The Ping: Local Government and Cloud Services","name":"The Ping: Local Government and Cloud Services","description":"As a government entity you have to be stringent when choosing a service for your organization. Do you know what components to look for in a 3rd party vendor?","datePublished":"2019-07-08","dateModified":"2019-07-09","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/07\/Checklist-e1562356056532.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/07\/Checklist-e1562356056532.jpg","height":266,"width":400},"url":"https:\/\/univista.com\/posts\/the-ping-local-government-and-cloud-services\/","about":["BUSINESS CONTINUITY","business management","cloud","compliance","PCI DSS","planning","safety","Security","The Ping"],"wordCount":595,"articleBody":"ShareTweet                                        What is unique about a city or local governmental organization? Services must be tailored to a local government\u2019s unique needs. Governments are subject to a strict budgeting process that generally can\u2019t be altered throughout the fiscal year. Any additional items not on these budgets, in which costs exceed a specific price point, are subject to a bidding process; sometimes this can take place even before being finalized in the budget. Furthermore, all items are subject to an open records request. We realize that this month we\u2019re talking about a very specific set of customers. That does not mean non-city customers should set your alarm for August 1st and tune out for July. We consistently write our articles so that they contain helpful information that anyone can utilize in order to help make your organization a better and more efficient workplace.2FAWhen searching for a cloud-based vendor, one of the most important requirements to inquire about is whether or not they have two-factor or multi-factor authentication capabilities. Considering the current uptake in government ransomware incidents, cities must be diligent in proactively allowing only permitted employees to access their software and network. In The Ping: 2FA, we discussed what this process is. Multi-factor authentication is a mechanism of confirming one\u2019s identity using a combination of at least two factors or methods from the list below:Something ONLY you know (a password or an answer to a question) Something ONLY you possess (a key fob or a cell phone that generates a time expired key code) Something ONLY you are (a fingerprint or an iris scan) This helps create an extra line of defense against hackers trying to obtain access to the network. Also, as a city you are most likely required to stay compliant under one or more agencies. Multi-factor authentication is required by CJIS (also known as Advanced Authentication in CJIS), PCI and HIPPA compliancy.Business ContinuityThe importance of being prepared in case something does happen to your network infrastructure has been communicated again and again. However, have you stopped and thought about what happens if a cloud vendor you rely on for your day-to-day operations goes offline? Do these vendors have a business plan in place, and do they make this accessible to their customers? Cities aren\u2019t the only entities vulnerable to attack. The vendors that provide services to your organization can also fall victim. When choosing a vendor, ensure they have a business continuity plan in line with what you would apply to your own organization\u2019s goals.Vendors need reliable backups and should disclose where they are backing up toAre their backups only local, or are they also offsite? Do they have a Disaster Recovery Plan? Do they have a Business Continuity Plan? Learn more here: The Ping: Disaster Recovery And Business Continuity Planning 101 In the event something does go wrong, does the vendor you\u2019ve chosen have a Security Plan that they\u2019ve made their employees aware of? Obtaining a new cloud vendor may seem like an abundance of work at first, but if you start your search with a checklist of what you need, it will ultimately save your company time. Cloud services are intended to make your life easier; if this seems overwhelming, let us help! We ensure that every cloud vendor we partner with is compliant with all of the above criteria. As always, speak to your account manager today to figure out what you need to select the right vendor!&nbsp;Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: Local Government and Cloud Services","item":"https:\/\/univista.com\/posts\/the-ping-local-government-and-cloud-services\/#breadcrumbitem"}]}]