Crunch Time: #1 Reason You Shouldn’t Delay Getting the New GSA Cyber SINs

Posted by Mac Ritch on Mar 2, 2017 1:56:10 PM

 THE TIME IS NOW.

You may or may not be aware that by submitting a proposal for a GSA Schedule 70 contract with the new GSA Cyber Security SINs (Penetration Testing, Incident Response, Cyber Hunt, and Risk & Vulnerability Assessments) it will take you on average 45 days to be awarded a schedule. In the commercial world this may sound like an ordinary time to award, but since we are dealing with the US Government, this is extremely expedited. The average time-to-award for a GSA Schedule 70 proposal including other SINs under the GSA’s IT Schedule 70 is 4-6 months.

Read More

Topics: cyber security

National Cyber Security Awareness Month: Why It Matters

Posted by Kevin Lancaster on Oct 12, 2016 12:06:27 PM

Read More

Topics: cyber security

Personal Email Breaches – The Keys to an Organization’s Most Sensitive Data

Posted by Kevin Lancaster on Oct 26, 2015 12:12:44 PM

CIA Director John Brennan’s personal @AOL.com email account was hacked into by a high school student and his personal information was exposed on WikiLeaks on October 21, 2015. They published his Social Security numbers, passport numbers, credit card and addresses of his family and associates. In addition, they released emails and documents generated before Brennan’s time in the Obama administration and while it did not contain classified government information, this has triggered great concern within the intelligence community and U.S. Government.

Read More

Topics: cyber security, data breach, cyber attacks

Ashley Madison Breach Exposes More Than Just Cheating

Posted by Kevin Lancaster on Aug 24, 2015 3:25:00 PM

The recent Ashley Madison hack doesn’t just have divorce attorneys and spouses scrambling. Federal, municipal and plenty of private sector employers are all on high alert. And they should be. 

Read More

Topics: cyber security, data breach, cyber attacks

Third Party Data Breaches - Not My Problem!

Posted by Kevin Lancaster on May 13, 2015 11:54:00 AM

We often hear from the public sector that web-based attacks that occur at companies like Adobe, Forbes, Sony, or Anthem are not their problem.  Public Sector organizations secure their own networks with the best hardware, detection software, and penetration testing, and have in place stringent rules about passwords and top-notch use policies that ensure they are safe.  In every case, the security chain is only as strong as its weakest link.

Read More

Topics: cyber security, data breach, cyber attacks

The Importance of Identity Management: Understanding the Lesson of the Target Breach

Posted by Kevin Lancaster on Apr 22, 2015 9:45:00 AM

With the ever growing accessibility of personal devices to organizational networks, identity management has never been of higher importance in both the public and private sector. Organizations’ IT networks contain an endless amount of sensitive data, and without proper authentication protocols, this data is at constant risk of breach. In the commercial space, the retailer Target’s breach in late 2013 was a difficult reminder that not addressing cyber risks on every level of your organization can lead to severe ramifications and security compromises.

Read More

Topics: cyber security, identity fraud, data breach

Cyber Attacks Increasing on Law Enforcement and Public Officials

Posted by Kevin Lancaster on Apr 16, 2015 1:38:00 PM

The Internet Crime Complaint Center (IC3), which is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), was designed to expand the reach of law enforcement on the local, state, and federal levels to combat against cyber attacks. 

Read More

Topics: cyber security, cyber attacks

Subscribe to Updates


benefits-of-a-GSA-schedule

Posts by Topic

see all

Subscribe to Email Updates