The Blog at Next Phase Solutions
Protecting Sensitive Data by Replacing Vulnerable Legacy Business Software
As a former Federal Facilities Security Officer (FSO), Program Security Manager (PSM), Counterintelligence agent, and executive responsible for Cyber Forensic programs, I have observed a recurring vulnerability to sensitive Federal data associated with legacy business...
The New Small Business Runway Extension Act Impacts You!
In early to mid-December 2018, the House and the Senate proposed a bill that was quickly signed by the President. The Small Business Runway Extension Act of 2018 became law on December 17, 2018, amending The Small Business Act. The principle change brought about by...
Can Our Election Machines be Protected from Hackers and Other Mischief?
The integrity of our election process has been the focus of many in recent years. There is little argument that ensuring the reliability of our voting process is integral to the survival of our republic. Regardless of jurisdiction, our voting process should be...
Smart Uses of Federal End-of-Year Funds for IT
It’s mid-July and agency CFOs have completed their sweep of accounts to find uncommitted funds for possible reallocation. The Federal government spends approximately $90 billion on IT annually. However, for a host of reasons, not all funds designated for priority IT...
5 Elements for Federal CDO Success
The Federal work space is a-buzz over the role of agency Chief Data Officers (CDO). How will they optimize the use of existing agency data and bring new analytic capabilities to the business enterprise? I recall, as a Federal executive, when Chief Information Officers...
Do You Know Your Inspector General Risk Score?
IG Risk Score Regardless of whether you are responsible for a new program or manage a legacy enterprise, chances are an Office of the Inspector General (OIG) has oversight jurisdiction of your program. They are tasked with ensuring tax dollars are being spent...
Enterprise Search: Find What’s Missing & Secure What’s Private
Hyland Software recently announced the release of their Enterprise Search product. It was acquired with the purchase of the Perceptive product from Lexmark in July 2017. The product is a great fit in the Hyland family of products and is certain to be on any...
Big Changes to the Security Clearance Process Are Here
An Executive Order signed April 25, 2019, transfers responsibility for personal security background investigations and security clearances to the Department of Defense (DoD).
Four Actions CDOs Can Take to Comply with OPEN Data Act and 21st Century IDEA
There are four actions that agencies can take to quickly comply with new mandates while making broader enhancements to data management capabilities
Protecting Sensitive Data by Replacing Vulnerable Legacy Business Software
As a former Federal Facilities Security Officer (FSO), Program Security Manager (PSM), Counterintelligence agent, and executive responsible for Cyber Forensic programs, I have observed a recurring vulnerability to sensitive Federal data associated with legacy business...
The New Small Business Runway Extension Act Impacts You!
In early to mid-December 2018, the House and the Senate proposed a bill that was quickly signed by the President. The Small Business Runway Extension Act of 2018 became law on December 17, 2018, amending The Small Business Act. The principle change brought about by...
Can Our Election Machines be Protected from Hackers and Other Mischief?
The integrity of our election process has been the focus of many in recent years. There is little argument that ensuring the reliability of our voting process is integral to the survival of our republic. Regardless of jurisdiction, our voting process should be...
Smart Uses of Federal End-of-Year Funds for IT
It’s mid-July and agency CFOs have completed their sweep of accounts to find uncommitted funds for possible reallocation. The Federal government spends approximately $90 billion on IT annually. However, for a host of reasons, not all funds designated for priority IT...
5 Elements for Federal CDO Success
The Federal work space is a-buzz over the role of agency Chief Data Officers (CDO). How will they optimize the use of existing agency data and bring new analytic capabilities to the business enterprise? I recall, as a Federal executive, when Chief Information Officers...
Do You Know Your Inspector General Risk Score?
IG Risk Score Regardless of whether you are responsible for a new program or manage a legacy enterprise, chances are an Office of the Inspector General (OIG) has oversight jurisdiction of your program. They are tasked with ensuring tax dollars are being spent...
Enterprise Search: Find What’s Missing & Secure What’s Private
Hyland Software recently announced the release of their Enterprise Search product. It was acquired with the purchase of the Perceptive product from Lexmark in July 2017. The product is a great fit in the Hyland family of products and is certain to be on any...
Big Changes to the Security Clearance Process Are Here
An Executive Order signed April 25, 2019, transfers responsibility for personal security background investigations and security clearances to the Department of Defense (DoD).
Four Actions CDOs Can Take to Comply with OPEN Data Act and 21st Century IDEA
There are four actions that agencies can take to quickly comply with new mandates while making broader enhancements to data management capabilities
Solving with Simplicity

Location
1221 East Broadway Street
Suite 1001
Oviedo, FL 32765
Contact Us
407-440-1411
800-677-0008
information@npsols.com