Category Archives: Information Security

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Image | Posted on by | Tagged , , , , ,

Summer Podcast Roundup – Podcasts You May Have Missed

Looking for some entertainment as you try to beat the heat by the pool? Put on your headphones and check out some of our recent podcasts! Today’s WatchBlog catches you up on some of the podcasts you may have missed … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , ,

Are Tax Practitioners Protecting Your Personal Information?

Doing your taxes can be complicated. So it’s no surprise that nearly 90% of taxpayers use either a paid preparer or tax software to prepare and file their taxes each year. In an age of data breaches and identity theft, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Credit Reporting Agencies and You

If you’ve ever signed up for a credit card or taken out a loan to buy a car, the credit card company or bank has probably checked your credit report to see if you qualify. But where does the information … Continue reading

Image | Posted on by | Tagged , , , , , ,

What Can You Do After a Data Breach?

Chances are you or someone you know is one of the hundreds of millions of people whose personal data has been exposed in a data breach. But once your personal information is out there, what can you do to prevent … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

Your Internet Privacy

Do you shop or bank online? Use the Internet to stay connected with friends and family? Internet-based products and services regularly collect and share personal information about users, such as location, search terms and browsing history, contact information, and financial … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

IRS in Need of Better Controls to Safeguard Taxpayer Data

Every tax season, you send information to the IRS about your salary, marriage status, and other personal and financial information. We’ve looked at whether IRS has effective controls in place to protect the sensitive financial and taxpayer data in its … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , ,