Tag Archives: Information technology and cybersecurity

Recent Cyberattacks Further Highlight Need For Action

Recent high-profile and widespread cyberattacks on federal agencies and national infrastructure have further highlighted the need for the government to address this attack and prevent future ones. However, these threats and the challenges in addressing them are long-standing and have … Continue reading

Posted in About GAO, Collections, High Risk List | Tagged , , , , , , , , , , , | Leave a comment

Why Do Banks Share Your Financial Information and Are They Allowed To?

In a word: yes. If you’ve ever applied for a loan, you know that banks and credit unions collect a lot of personal financial information from you, such as your income and credit history. And it’s not uncommon for lenders … Continue reading

Posted in About GAO, Business Regulation and Consumer Protection, Collections | Tagged , , , , , , , | Leave a comment

FedRAMP—Ensuring Safe Use of Cloud Computing by Federal Agencies

Federal agencies increasingly use internet-based (cloud) services to fulfill their missions. However, those services pose cybersecurity risks when agencies don’t effectively implement related security controls. The 2011 Federal Risk and Authorization Management Program (or FedRAMP) aims to standardize the approach … Continue reading

Posted in About GAO | Tagged , , , | Leave a comment

Prioritizing the Needs of the Federal IT Workforce

The federal government spends over $90 billion on information technology (IT) every year. However, IT projects frequently fail, go over budget, or face unexpected delays. Additionally, threats to federal IT infrastructure continue to grow in number and sophistication. Federal agencies … Continue reading

Posted in About GAO, Information Technology | Tagged , , , , , | Leave a comment

Federal Information Security: There’s Work to Do

Just about every federal government operation—from processing taxes and protecting national parks to coordinating military operations and delivering foreign aid—relies in some way on computers. Protecting government computer systems and the information stored in them is vital, and a 2014 … Continue reading

Posted in Government Operations, Information Security | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Preparing for Evolving Cybersecurity Threats Facing the U.S. Electric Grid

Electricity is essential for modern life. In addition to our modern home conveniences, like our microwaves, computers, and lighting, electricity is vital to hospitals, first responders, and financial services in our country. So, what would happen if our electric grid … Continue reading

Posted in Information Security, Science and Technology | Tagged , , , , , , , , , , , , , , | Leave a comment

Proving You’re You: How Federal Agencies Can Improve Online Verification

So much of how we collect and share information in today’s world is done online. We get our news. We do our shopping and banking. We book appointments. And online access has even made it easier for us to apply … Continue reading

Posted in Information Security | Tagged , , , , , , , , , , , , | Leave a comment