Tag Archives: ITC

Recent Cyberattacks Further Highlight Need For Action

Recent high-profile and widespread cyberattacks on federal agencies and national infrastructure have further highlighted the need for the government to address this attack and prevent future ones. However, these threats and the challenges in addressing them are long-standing and have … Continue reading

Posted in About GAO, Collections, High Risk List | Tagged , , , , , , , , , , , | Leave a comment

FedRAMP—Ensuring Safe Use of Cloud Computing by Federal Agencies

Federal agencies increasingly use internet-based (cloud) services to fulfill their missions. However, those services pose cybersecurity risks when agencies don’t effectively implement related security controls. The 2011 Federal Risk and Authorization Management Program (or FedRAMP) aims to standardize the approach … Continue reading

Posted in About GAO | Tagged , , , | Leave a comment

Prioritizing the Needs of the Federal IT Workforce

The federal government spends over $90 billion on information technology (IT) every year. However, IT projects frequently fail, go over budget, or face unexpected delays. Additionally, threats to federal IT infrastructure continue to grow in number and sophistication. Federal agencies … Continue reading

Posted in About GAO, Information Technology | Tagged , , , , , | Leave a comment

Proving You’re You: How Federal Agencies Can Improve Online Verification

So much of how we collect and share information in today’s world is done online. We get our news. We do our shopping and banking. We book appointments. And online access has even made it easier for us to apply … Continue reading

Posted in Information Security | Tagged , , , , , , , , , , , , | Leave a comment

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Posted in Information Security, Information Technology, Podcast | Tagged , , , , , | Leave a comment

Summer Podcast Roundup – Podcasts You May Have Missed

Looking for some entertainment as you try to beat the heat by the pool? Put on your headphones and check out some of our recent podcasts! Today’s WatchBlog catches you up on some of the podcasts you may have missed … Continue reading

Posted in Agriculture and Food, Communications, Information Security, Information Technology, Podcast, Retirement Security, Worker and Family Assistance | Tagged , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Is the Cloud Saving the Government Money?

Have you ever wondered how the federal government provides important public services—like helping secure major sporting events or providing public access to weather data? Or how the Treasury manages supplies for printing currency, or the military transports cargo around the … Continue reading

Posted in Information Technology | Tagged , , , , , , , , , , , , , , | Leave a comment

The Secret Service’s IT Workforce

In addition to protecting the President, the Secret Service also investigates and prevents financial and electronic crimes—such as identity theft, counterfeiting, and computer-based attacks on the nation’s financial, banking, and telecommunications infrastructure. To do this, it relies heavily on its … Continue reading

Posted in Information Technology | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

How Social Security is Working to Overcome its IT Management Challenges

The Social Security Administration relies on its IT systems to provide monthly payments to over 64 million Americans. Even with such an important mission, the agency has a history of struggling to manage its IT effectively. However, SSA has been … Continue reading

Posted in Information Technology | Tagged , , , , , , , , , , , , , | Leave a comment

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Posted in Information Security, Podcast | Tagged , , , , , , , , , , , | Leave a comment