Category Archives: Information Security

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

Your Internet Privacy

Do you shop or bank online? Use the Internet to stay connected with friends and family? Internet-based products and services regularly collect and share personal information about users, such as location, search terms and browsing history, contact information, and financial … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

IRS in Need of Better Controls to Safeguard Taxpayer Data

Every tax season, you send information to the IRS about your salary, marriage status, and other personal and financial information. We’ve looked at whether IRS has effective controls in place to protect the sensitive financial and taxpayer data in its … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , ,

CIO Management Responsibilities Remain a Challenge for Most Agencies

Federal agencies planned to spend more than $96 billion on information technology (IT) in fiscal year 2018. IT systems are critical to the health, economy, and security of the nation. But the government faces longstanding problems in IT management. For … Continue reading

Image | Posted on by | Tagged , , ,

NASA’s IT Management and Cybersecurity

NASA depends heavily upon information technology (IT) to conduct its work. The agency spends at least $1.5 billion annually on IT investments that support its missions, including ground control systems for the International Space Station and space exploration programs. Because … Continue reading

Image | Posted on by | Tagged , , , ,

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Image | Posted on by | Tagged , , , , ,

Is Your Medicare Information Safe?

Is the Medicare information that doctors, hospitals, and insurance companies have about you, your parents, or your grandparents well protected? The Centers for Medicare & Medicaid Services (CMS) oversees the Medicare program, which covers nearly 58 million aged and disabled … Continue reading

Image | Posted on by | Tagged , , , , , ,

Cybersecurity—New Risks and Threats

Picture this: Atlanta’s municipal information system was hit with a cyberattack that prevented customers from accessing multiple applications, including paying bills and viewing court-related information. The Department of Justice reported indicting nine Iranians for a massive cybersecurity theft campaign on … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

Stopping Thieves from Stealing Tax Refunds

Want your refund right away? Well, fraudsters do too! For Tax Identity Theft Awareness Week, today’s WatchBlog focuses on why identity theft refund fraud is a problem and what the IRS is doing to stop this fraud and help its … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

Smartphone Apps and Stalking

These days, wherever people go, their smartphones follow—often collecting location data along the way. You may choose to download an app to your phone to share this information. For example, an app can show your friend how far away you … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,