-
Recent Posts
- Federal Smarter Buying Initiatives (podcast)
- Following the Money: The Audit Trail
- Breast Cancer and Young Women
- How the Government Engaged the Public to Help Rebuild After Sandy: The Rebuild by Design Competition
- National Save for Retirement Week
- The Great Shake Out: What You Need to Know About Earthquake Preparedness
- Measuring Federal Employee Performance
- Thinking about Joining Medicare Advantage?
- Veterans’ Health Care Physician Credentials (podcast)
- Federal Disaster Assistance (infographic)
Categories
- About GAO
- Agriculture and Food
- Auditing and Financial Management
- Budget and Spending
- Business Regulation and Consumer Protection
- Duplication and Cost Savings
- Economic Development
- Education
- Employment
- Energy
- Equal Opportunity
- Financial Markets and Institutions
- Fiscal Outlook and The Debt
- Fraud
- Government Operations
- Graphic
- Health Care
- High Risk List
- Homeland Security
- Housing
- Human Capital
- Infographic
- Information Management
- Information Security
- Information Technology
- Interactive graphic
- International Affairs
- Justice and Law Enforcement
- Mission Team
- National Defense
- Natural Resources and Environment
- OGC
- Podcast
- Quick Look
- Retirement Security
- Science and Technology
- Space
- Tax Policy and Administration
- Technology Assessment
- Transportation
- Veterans
- Video
- Worker and Family Assistance
Tag Archives: cyber attack
The National Cybersecurity Protection System (podcast)
With cyberattacks on the rise, protecting federal government computer systems, the infrastructure they control, and the private data stored within them is of the utmost importance. The National Cybersecurity Protection System is intended to help—but how well is it working? … Continue reading
Lights out? Cyber Threats to DOD Utilities
Nobody likes being in the dark. Some people invest in a generator or at least some candles for the occasional outage. But what if you’re the Department of Defense, and instead of bad weather knocking out the water or power, … Continue reading
Video on Power Outages on Military Bases
The Department of Defense uses computer systems to control electricity, natural gas, and other utility services on its military installations. According to DOD, these systems could be vulnerable to cyber threats. In fact, security testers destroyed a generator in a … Continue reading
A Closer Look at Privacy as a High Risk Area – When Advancing Technology Meets Increasing Concerns
From online health care exchanges to mobile device location data, the privacy of personally identifiable information (PII) is a major concern when it comes to information technology. Today, we take a closer look at the privacy of PII, and why … Continue reading
Image
May 19, 2015
Tagged cyber attack, cybersecurity, Greg Wilshusen, hackers, IT, malware, PII, privacy, Privacy Act, security breach, Target
Podcast on FAA Air Traffic Control Systems and Information Security
The Federal Aviation Administration relies on a vast array of increasingly interconnected systems and networks for air traffic control. Protecting these systems from internal and external threats is essential to ensuring safe, orderly, and efficient travel through our international air … Continue reading
Fiscal Exposures: 5 Sources of Risk that Drive Future Spending
In tandem with today’s release of our audit of the federal government’s fiscal year 2014 consolidated financial statements, we want to highlight our work on fiscal exposures. This is a term that describes services or expenditures that Americans may expect, … Continue reading