Category Archives: Information Security

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Credit Reporting Agencies and You

If you’ve ever signed up for a credit card or taken out a loan to buy a car, the credit card company or bank has probably checked your credit report to see if you qualify. But where does the information … Continue reading

Image | Posted on by | Tagged , , , , , ,

What Can You Do After a Data Breach?

Chances are you or someone you know is one of the hundreds of millions of people whose personal data has been exposed in a data breach. But once your personal information is out there, what can you do to prevent … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

Your Internet Privacy

Do you shop or bank online? Use the Internet to stay connected with friends and family? Internet-based products and services regularly collect and share personal information about users, such as location, search terms and browsing history, contact information, and financial … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

IRS in Need of Better Controls to Safeguard Taxpayer Data

Every tax season, you send information to the IRS about your salary, marriage status, and other personal and financial information. We’ve looked at whether IRS has effective controls in place to protect the sensitive financial and taxpayer data in its … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , ,

CIO Management Responsibilities Remain a Challenge for Most Agencies

Federal agencies planned to spend more than $96 billion on information technology (IT) in fiscal year 2018. IT systems are critical to the health, economy, and security of the nation. But the government faces longstanding problems in IT management. For … Continue reading

Image | Posted on by | Tagged , , ,

NASA’s IT Management and Cybersecurity

NASA depends heavily upon information technology (IT) to conduct its work. The agency spends at least $1.5 billion annually on IT investments that support its missions, including ground control systems for the International Space Station and space exploration programs. Because … Continue reading

Image | Posted on by | Tagged , , , ,

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Image | Posted on by | Tagged , , , , ,