Category Archives: Information Security

Federal Information Security: There’s Work to Do

Just about every federal government operation—from processing taxes and protecting national parks to coordinating military operations and delivering foreign aid—relies in some way on computers. Protecting government computer systems and the information stored in them is vital, and a 2014 … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Preparing for Evolving Cybersecurity Threats Facing the U.S. Electric Grid

Electricity is essential for modern life. In addition to our modern home conveniences, like our microwaves, computers, and lighting, electricity is vital to hospitals, first responders, and financial services in our country. So, what would happen if our electric grid … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

Proving You’re You: How Federal Agencies Can Improve Online Verification

So much of how we collect and share information in today’s world is done online. We get our news. We do our shopping and banking. We book appointments. And online access has even made it easier for us to apply … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , ,

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Image | Posted on by | Tagged , , , , ,

Summer Podcast Roundup – Podcasts You May Have Missed

Looking for some entertainment as you try to beat the heat by the pool? Put on your headphones and check out some of our recent podcasts! Today’s WatchBlog catches you up on some of the podcasts you may have missed … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , ,

Are Tax Practitioners Protecting Your Personal Information?

Doing your taxes can be complicated. So it’s no surprise that nearly 90% of taxpayers use either a paid preparer or tax software to prepare and file their taxes each year. In an age of data breaches and identity theft, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Credit Reporting Agencies and You

If you’ve ever signed up for a credit card or taken out a loan to buy a car, the credit card company or bank has probably checked your credit report to see if you qualify. But where does the information … Continue reading

Image | Posted on by | Tagged , , , , , ,

What Can You Do After a Data Breach?

Chances are you or someone you know is one of the hundreds of millions of people whose personal data has been exposed in a data breach. But once your personal information is out there, what can you do to prevent … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,