-
Recent Posts
- Move Over! How Are Governments Trying to Protect First Responders From Roadside Crashes? (video)
- How GAO’s Recommendations Can Help the New Congress and President
- COVID-19 Vaccines and the Lessons Learned from H1N1
- Recent Cyberattacks Further Highlight Need For Action
- Protecting Federal Research from Foreign Influence
- Celebrating 100 Years of Making Government Work Better for You
- Getting in Fiscal Shape — How Changing Future Spending and Revenue Could Improve Government Finances (interactive graphic)
- What is 5G and Why Does It Matter?
- Why Do Banks Share Your Financial Information and Are They Allowed To?
- Why is CDC Screening Fewer People for Breast and Cervical Cancer?
Categories
- About GAO
- Agriculture and Food
- Auditing and Financial Management
- Budget and Spending
- Business Regulation and Consumer Protection
- Collections
- Communications
- Coronavirus
- disaster assistance
- Disaster Assistance
- Duplication and Cost Savings
- Economic Development
- Education
- Employment
- Energy
- Equal Opportunity
- Financial Markets and Institutions
- Fiscal Outlook and The Debt
- Fraud
- Government Operations
- Graphic
- Health Care
- High Risk List
- Homeland Security
- Housing
- Human Capital
- Infographic
- Information Management
- Information Security
- Information Technology
- Interactive graphic
- International Affairs
- Justice and Law Enforcement
- Key Issues
- Mission Team
- National Defense
- Natural Resources and Environment
- OGC
- Podcast
- Quick Look
- Racial Disparities
- Recovery Act
- Retirement Security
- Science and Technology
- Space
- Tax Policy and Administration
- Technology Assessment
- Topics
- Trade
- Transportation
- Veterans
- Video
- Worker and Family Assistance
Tag Archives: cyber attack
Recent Cyberattacks Further Highlight Need For Action
Recent high-profile and widespread cyberattacks on federal agencies and national infrastructure have further highlighted the need for the government to address this attack and prevent future ones. However, these threats and the challenges in addressing them are long-standing and have … Continue reading
Posted in About GAO, Collections, High Risk List
Tagged Chuck Young, cyber attack, cyber threat, cyberattacks, cybersecurity, Department of Homeland Security, information and communication, information management, information security, Information technology and cybersecurity, ITC, national security
Leave a comment
Protecting Critical Infrastructure from Cyberattacks
The nation’s critical infrastructures —such as energy, transportation systems, communications, and financial services—are dependent on information technology (IT) systems and electronic data to carry out and report on operations. But these systems are increasingly at risk from things like insider … Continue reading
Posted in About GAO
Tagged CNSA, cyber attack, cyber threat, cybersecurity, Department of Energy, national security, NIST, TSA, William Russell
Leave a comment
Cybersecurity—New Risks and Threats
Picture this: Atlanta’s municipal information system was hit with a cyberattack that prevented customers from accessing multiple applications, including paying bills and viewing court-related information. The Department of Justice reported indicting nine Iranians for a massive cybersecurity theft campaign on … Continue reading
Mission Accomplished? What DOD Needs to Do to Address Its Key Challenges
Defending the nation is no easy task. DOD faces a wide array of evolving threats. And more than a decade of warfare has taken its toll on DOD personnel and equipment. So where does that leave the Department? Today’s WatchBlog … Continue reading
The National Cybersecurity Protection System (podcast)
With cyberattacks on the rise, protecting federal government computer systems, the infrastructure they control, and the private data stored within them is of the utmost importance. The National Cybersecurity Protection System is intended to help—but how well is it working? … Continue reading
Lights out? Cyber Threats to DOD Utilities
Nobody likes being in the dark. Some people invest in a generator or at least some candles for the occasional outage. But what if you’re the Department of Defense, and instead of bad weather knocking out the water or power, … Continue reading
Video on Power Outages on Military Bases
The Department of Defense uses computer systems to control electricity, natural gas, and other utility services on its military installations. According to DOD, these systems could be vulnerable to cyber threats. In fact, security testers destroyed a generator in a … Continue reading
A Closer Look at Privacy as a High Risk Area – When Advancing Technology Meets Increasing Concerns
From online health care exchanges to mobile device location data, the privacy of personally identifiable information (PII) is a major concern when it comes to information technology. Today, we take a closer look at the privacy of PII, and why … Continue reading
Posted in High Risk List, Information Security, Information Technology
Tagged cyber attack, cybersecurity, Greg Wilshusen, hackers, IT, malware, PII, privacy, Privacy Act, security breach, Target
Leave a comment
Podcast on FAA Air Traffic Control Systems and Information Security
The Federal Aviation Administration relies on a vast array of increasingly interconnected systems and networks for air traffic control. Protecting these systems from internal and external threats is essential to ensuring safe, orderly, and efficient travel through our international air … Continue reading
Fiscal Exposures: 5 Sources of Risk that Drive Future Spending
In tandem with today’s release of our audit of the federal government’s fiscal year 2014 consolidated financial statements, we want to highlight our work on fiscal exposures. This is a term that describes services or expenditures that Americans may expect, … Continue reading