Category Archives: Information Security

Preparing for Evolving Cybersecurity Threats Facing the U.S. Electric Grid

Electricity is essential for modern life. In addition to our modern home conveniences, like our microwaves, computers, and lighting, electricity is vital to hospitals, first responders, and financial services in our country. So, what would happen if our electric grid … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

Proving You’re You: How Federal Agencies Can Improve Online Verification

So much of how we collect and share information in today’s world is done online. We get our news. We do our shopping and banking. We book appointments. And online access has even made it easier for us to apply … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , ,

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Image | Posted on by | Tagged , , , , ,

Summer Podcast Roundup – Podcasts You May Have Missed

Looking for some entertainment as you try to beat the heat by the pool? Put on your headphones and check out some of our recent podcasts! Today’s WatchBlog catches you up on some of the podcasts you may have missed … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , ,

Are Tax Practitioners Protecting Your Personal Information?

Doing your taxes can be complicated. So it’s no surprise that nearly 90% of taxpayers use either a paid preparer or tax software to prepare and file their taxes each year. In an age of data breaches and identity theft, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Credit Reporting Agencies and You

If you’ve ever signed up for a credit card or taken out a loan to buy a car, the credit card company or bank has probably checked your credit report to see if you qualify. But where does the information … Continue reading

Image | Posted on by | Tagged , , , , , ,

What Can You Do After a Data Breach?

Chances are you or someone you know is one of the hundreds of millions of people whose personal data has been exposed in a data breach. But once your personal information is out there, what can you do to prevent … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,