Tag Archives: cybersecurity

Are Tax Practitioners Protecting Your Personal Information?

Doing your taxes can be complicated. So it’s no surprise that nearly 90% of taxpayers use either a paid preparer or tax software to prepare and file their taxes each year. In an age of data breaches and identity theft, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

The Future of the Federal Workforce

For Public Service Recognition Week, we’re celebrating the valuable contributions federal employees—including our GAO colleagues—provide to our country every day. This week is also a good time to think about how the government can manage its workforce in the future. … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

GAO’s 2019 High-Risk List Update

Today we released our 2019 High Risk List, which includes 35 areas that we consider to be at high risk for waste, fraud, abuse, or mismanagement, or in need of transformation. Since our 2017 report, the rankings for more than … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , ,

NASA’s IT Management and Cybersecurity

NASA depends heavily upon information technology (IT) to conduct its work. The agency spends at least $1.5 billion annually on IT investments that support its missions, including ground control systems for the International Space Station and space exploration programs. Because … Continue reading

Image | Posted on by | Tagged , , , ,

DHS Cybersecurity Workforce

Secure federal computer systems depend on the federal and contractor workforce who design, develop, implement, secure, maintain, and use them. But the federal government faces a persistent shortage of workers trained in cybersecurity and information technology. The Department of Homeland … Continue reading

Image | Posted on by | Tagged , , , , ,

Cybersecurity—New Risks and Threats

Picture this: Atlanta’s municipal information system was hit with a cyberattack that prevented customers from accessing multiple applications, including paying bills and viewing court-related information. The Department of Justice reported indicting nine Iranians for a massive cybersecurity theft campaign on … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

The Evolution of CYBERCOM

The Department of Defense faces tens of millions of attempted cyberattacks every year. In response, it established the U.S. Cyber Command in 2009 to more effectively address the growing risk of these threats. Although initially located within the U.S. Strategic … Continue reading

Image | Posted on by | Tagged , , , , , , , , , ,

Mission Accomplished? What DOD Needs to Do to Address Its Key Challenges

Defending the nation is no easy task. DOD faces a wide array of evolving threats. And more than a decade of warfare has taken its toll on DOD personnel and equipment. So where does that leave the Department? Today’s WatchBlog … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , ,