Tag Archives: ITC

A Look at the Federal Government’s Aging Computer Systems

Imagine trying to read this post on a first- or second-generation mobile phone. It would be slow to load and the screen image wouldn’t be as crisp as the one you’re probably looking at right now. There’d be a lot … Continue reading

Image | Posted on by | Tagged , , , , ,

Summer Podcast Roundup – Podcasts You May Have Missed

Looking for some entertainment as you try to beat the heat by the pool? Put on your headphones and check out some of our recent podcasts! Today’s WatchBlog catches you up on some of the podcasts you may have missed … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , , , , , , , ,

Is the Cloud Saving the Government Money?

Have you ever wondered how the federal government provides important public services—like helping secure major sporting events or providing public access to weather data? Or how the Treasury manages supplies for printing currency, or the military transports cargo around the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , ,

The Secret Service’s IT Workforce

In addition to protecting the President, the Secret Service also investigates and prevents financial and electronic crimes—such as identity theft, counterfeiting, and computer-based attacks on the nation’s financial, banking, and telecommunications infrastructure. To do this, it relies heavily on its … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , , , ,

How Social Security is Working to Overcome its IT Management Challenges

The Social Security Administration relies on its IT systems to provide monthly payments to over 64 million Americans. Even with such an important mission, the agency has a history of struggling to manage its IT effectively. However, SSA has been … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , ,

An Ongoing Risk: Cybersecurity Attacks at Federal Agencies

Similar to how new flu shots come out each year to combat new strains of the virus, agencies must routinely adapt their cybersecurity efforts to address evolving threats. In today’s WatchBlog, we look at the federal government’s approach to and … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , ,

Risky Business—Threats in the IT Supply Chain

Laptops aren’t like IKEA furniture—we usually buy them pre-assembled and ready to use. The life of a computer starts long before it’s purchased, though, and the process of creating and moving a computer from suppliers to users can create security … Continue reading

Image | Posted on by | Tagged , , , , , , , , ,

GAO’s Information Technology & Cybersecurity Team

GAO’s workforce is organized largely by subject area, with most employees working in one of our 15 mission teams. Today we’ll be putting the spotlight on our Information Technology & Cybersecurity (ITC) team, which helps the government respond to the … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , , , ,

IRS in Need of Better Controls to Safeguard Taxpayer Data

Every tax season, you send information to the IRS about your salary, marriage status, and other personal and financial information. We’ve looked at whether IRS has effective controls in place to protect the sensitive financial and taxpayer data in its … Continue reading

Image | Posted on by | Tagged , , , , , , , , , , , , ,