{"id":33033,"date":"2019-12-24T04:03:00","date_gmt":"2019-12-24T09:03:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33033"},"modified":"2019-12-24T04:03:00","modified_gmt":"2019-12-24T09:03:00","slug":"considering-rpa-make-sure-you-understand-the-security-implications","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/12\/24\/considering-rpa-make-sure-you-understand-the-security-implications\/","title":{"rendered":"Considering RPA? Make sure you understand the security implications"},"content":{"rendered":"\n<p>By Jodi Schatz &#8211; Robotic process automation is gaining traction in government, after having gotten its start in private-sector enterprises. <strong>RPA<\/strong> applies elements of artificial intelligence to workflow processes to allow employees to shift from routine tasks to more high-value work. In fact, the opportunities for improving efficiencies in the public sector are so great that the federal government is now mandating agencies adopt technologies like <strong>RPA<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2014\/11\/04\/08\/07\/mark-516279_960_720.jpg\" alt=\"\" width=\"288\" height=\"194\"\/><\/figure><\/div>\n\n\n\n<p>But automation is also enabling possible security risks that have not been encountered yet. It\u2019s tempting to start looking for ways to implement <strong>RPA <\/strong>as the Office of Management and Budget would have agencies do, but before then, federal IT decision-makers must get up to speed on <strong>RPA <\/strong>and ensure that the current levels of data security applied to humans extends to robots as well.<\/p>\n\n\n\n<p>Why the fascination with <strong>RPA<\/strong>? On its own, automation can reduce costs and improve efficiency. Add intelligence to the mix, as with <strong>RPA<\/strong>, and the value is greater, enabling continuous operation with reduced human error and improved information processing.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/gcn.com\/articles\/2019\/12\/18\/rpa-security.aspx&amp;ct=ga&amp;cd=CAEYAioUMTI0MjI5MzQzMzY3OTU2NDE0MzcyGjg3OTEwMGZiYmM3MWIwNjQ6Y29tOmVuOlVT&amp;usg=AFQjCNF78_k1SVLdaVdugdSjm_sLRjB7rg\">Read On:<\/a><\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"left\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B07NJPXRBC&#038;asins=B07NJPXRBC&#038;linkId=b4802fa92a3118baea88c437c57a1218&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>By Jodi Schatz &#8211; Robotic process automation is gaining traction in government, after having gotten its start in private-sector enterprises. RPA applies elements of artificial intelligence to workflow processes to allow employees to shift from routine tasks to more high-value <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/12\/24\/considering-rpa-make-sure-you-understand-the-security-implications\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[628],"tags":[629],"class_list":["post-33033","post","type-post","status-publish","format-standard","hentry","category-rpa","tag-rpa"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33033"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33033\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}