Putting together a GSA Schedule proposal is a lot of work—we don’t sugar coat that. A lot of our clients have come to us having attempted a Multiple Award Schedule (MAS) proposal by themselves, and after going through all the work of putting together documents and submitting them to the eOffer system, they receive a rejection notice. This means that they have to start back at the beginning of the process, which can be extremely frustrating after putting in time and effort into the proposal. Let’s dive into some tips into your next steps if your GSA Schedule proposal is rejected.
GSA Schedule contractors have dealt with a lot of changes recently - from the three phases of the Multiple Award Schedule (MAS) Consolidation to the recent MAS Solicitation Refresh #5, it can be a lot to keep up with. One of the newest updates to eOffer and eMod is part of GSA’s IT modernization efforts to support security and provide solutions that are recognized internationally.
Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.
If you have a GSA contract or have worked with the General Services Administration in any capacity, you have undoubtedly heard the terms “NAICS code” referenced before. But what exactly is a NAICS Code? And what is their relevance to the GSA and Multiple Award Schedule?
If you look back at your 2020 plans and goals from last January, they probably don’t mention anything about a global pandemic. 2020 was an incredibly unpredictable year for all of us. Despite the economic uncertainty, government spending continues to steadily increase as agencies spring to action to make sure national, state, and local organizations have the resources they need to provide COVID-19 relief.
On December 22, 2020, Congress passed a COVID-19 relief bill making it part of one of the highest spending bills in American history. The $900 billion Coronavirus bill is attached to an omnibus spending bill for the 2021 Fiscal Year totaling $2.3 trillion.
This year has seen a sharp increase in cyberattacks and security breaches that have compromised sensitive data in nearly every sector, including federal government agencies, and contractors who work with the government. With each new breach, especially the recent massive cyber attack on SolarWinds, it becomes increasingly clear that bad actors are capable of not only accessing standalone critical assets, but also traversing undetected across networks and workloads to expand their footholds.