Category Archives: Information Security

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Image | Posted on by | Tagged , , , , ,

Is Your Medicare Information Safe?

Is the Medicare information that doctors, hospitals, and insurance companies have about you, your parents, or your grandparents well protected? The Centers for Medicare & Medicaid Services (CMS) oversees the Medicare program, which covers nearly 58 million aged and disabled … Continue reading

Image | Posted on by | Tagged , , , , , ,

Cybersecurity—New Risks and Threats

Picture this: Atlanta’s municipal information system was hit with a cyberattack that prevented customers from accessing multiple applications, including paying bills and viewing court-related information. The Department of Justice reported indicting nine Iranians for a massive cybersecurity theft campaign on … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

Stopping Thieves from Stealing Tax Refunds

Want your refund right away? Well, fraudsters do too! For Tax Identity Theft Awareness Week, today’s WatchBlog focuses on why identity theft refund fraud is a problem and what the IRS is doing to stop this fraud and help its … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

Smartphone Apps and Stalking

These days, wherever people go, their smartphones follow—often collecting location data along the way. You may choose to download an app to your phone to share this information. For example, an app can show your friend how far away you … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Federal Cybersecurity Challenges

These days, when you turn on the news you almost always see another hack, leak, or breach putting sensitive information at risk. But we’ve been focusing on keeping federal agency information systems secure for a long time. For October’s Cybersecurity … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Eyes in the Sky | Could We Be Headed for Less Accurate Weather Forecasts?

Satellites are critical for timely forecasts and warnings of extreme weather events. But, as we’ve discussed before, some of these satellites are aging and should be replaced. The National Oceanic and Atmospheric Administration oversees key weather satellites, and today we’re … Continue reading

Image | Posted on by | Tagged , , , , , ,

The Stubborn Problem of Identity Theft Tax Refund Fraud (podcast)

The Internal Revenue Service estimates that it paid out more than $3 billion in identity theft tax refund fraud in 2014—i.e., fraudsters using stolen identities to file taxes in someone else’s name, collecting tax refunds, and then disappearing. Jay McTigue, … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

Smartphone Tracking Apps (podcast)

Smartphones have apps that can help parents keep track of their kids or businesses keep tabs on deliveries. But some of these tracking apps could also be used to facilitate stalking. Listen to Mark Goldstein, a director in our Physical … Continue reading

Image | Posted on by | Tagged , , , , , ,

Weaknesses in IRS Information Security (podcast)

To do its job, the IRS has to collect and keep a variety of sensitive information about taxpayers. But how does it make sure this information is secure? Listen to Greg Wilshusen, a director in our Information Technology team, discuss … Continue reading

Image | Posted on by | Tagged , , , , , ,