Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Technology

How User Credentials Are Stolen

By: Brian Dunn
May 21st, 2015

Already, 2015 has seen a substantial increase in cyber-attacks by cyber criminals to steal large volumes of data and credentials. These attacks include theft of users’ credentials—such as passwords, usernames, e-mail addresses—and other forms of Personally Identifiable Information (PII) used by customers, employees, and third parties. User credentials can be stolen in many ways and the cyber-attack taxonomy can be quite confusing. Among them can include:

Read More

Share

Blog Feature

GSA Schedule | Resources and Insight

What is NASPO ValuePoint?

By: David Baldino
May 15th, 2015

On Tuesday April 28th 2015, I was able to attend the NASPO ValuePoint Vendor Kickoff Meeting, hosted by NASPO ValuePoint in Bloomington, MN. This meeting was intended to educate both current and newly awarded contract holders for the Computer Equipment, Peripherals & Related Services Contract under NASPO ValuePoint.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Government

Selling to the Government: Top 5 Ways To Be Proactive

By: Kevin Lancaster
May 13th, 2015

Being proactive in the federal marketplace requires government contractors to perform a diverse set of activities in order to position themselves for the most opportunities. When I talk to government contractors, both small and large, I often hear some of the same frustrations. The top 5 things I hear are:

Read More

Share

Blog Feature

Technology

Third Party Data Breaches - Not My Problem!

By: Kevin Lancaster
May 13th, 2015

We often hear from the public sector that web-based attacks that occur at companies like Adobe, Forbes, Sony, or Anthem are not their problem. Public Sector organizations secure their own networks with the best hardware, detection software, and penetration testing, and have in place stringent rules about passwords and top-notch use policies that ensure they are safe. In every case, the security chain is only as strong as its weakest link.

Read More

Share

Blog Feature

GSA Schedule

What is a GSA Schedule Contract?

By: Kevin Lancaster
May 8th, 2015

"What is a GSA Schedule contract?" This question may seem like it would have a simple answer, but if you’re completely new to the topic, the explanation can become a bit complex. You may already be familiar with the endless acronyms of the Federal Government, and in this language sometimes referred to as “Government speak,” everything has the potential to sound overly advanced, bureaucratic and cumbersome. However, in approaching this question differently, it is not as advanced as it sounds.

Read More

Share

Blog Feature

GSA Schedule

Selling to the Government - Session 1: Building Your Government Practice

By: Kevin Lancaster
May 7th, 2015

Did you miss our presentation yesterday afternoon? You can now download a free copy of this presentation. If you're looking to build a thriving government practice, you must first understand how to get your practice off the ground, build relationships with key decision makers, and ultimately win government business. Download our webinar Selling to the Government - Session 1: Building Your Government Practice to learn:

Read More

Share