Tag Archives: cybersecurity

Protecting Critical Infrastructure from Cyberattacks

The nation’s critical infrastructures —such as energy, transportation systems, communications, and financial services—are dependent on information technology (IT) systems and electronic data to carry out and report on operations. But these systems are increasingly at risk from things like insider … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

Federal Information Security: There’s Work to Do

Just about every federal government operation—from processing taxes and protecting national parks to coordinating military operations and delivering foreign aid—relies in some way on computers. Protecting government computer systems and the information stored in them is vital, and a 2014 … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Protecting our Critical Infrastructure

We depend on the nation’s critical infrastructure—such as the systems that provide energy, transportation, communications, and financial services—to provide us with our basic needs. In today’s WatchBlog, we explore federal efforts to protect some of our critical infrastructure from things … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , ,

Preparing for Evolving Cybersecurity Threats Facing the U.S. Electric Grid

Electricity is essential for modern life. In addition to our modern home conveniences, like our microwaves, computers, and lighting, electricity is vital to hospitals, first responders, and financial services in our country. So, what would happen if our electric grid … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

Proving You’re You: How Federal Agencies Can Improve Online Verification

So much of how we collect and share information in today’s world is done online. We get our news. We do our shopping and banking. We book appointments. And online access has even made it easier for us to apply … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , ,

Artificial Intelligence: Still a Long Way from Judgment Day

The 1991 sci-fi film Terminator 2 predicted that artificial intelligence (AI) software known as Skynet would become self-aware on August 29, 1997, and rapidly take over the world. Today, even as we celebrate avoiding such an extreme outcome for 22 … Continue reading

Image | Posted on by | Tagged , , , , , , , ,

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Image | Posted on by | Tagged , , , , ,

Are Tax Practitioners Protecting Your Personal Information?

Doing your taxes can be complicated. So it’s no surprise that nearly 90% of taxpayers use either a paid preparer or tax software to prepare and file their taxes each year. In an age of data breaches and identity theft, … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

The Future of the Federal Workforce

For Public Service Recognition Week, we’re celebrating the valuable contributions federal employees—including our GAO colleagues—provide to our country every day. This week is also a good time to think about how the government can manage its workforce in the future. … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,