Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Technology | NETFED

Top Three Benefits of Partnering on Winvale’s GSA Schedule

By: Kevin Lancaster
February 25th, 2016

Many small businesses build a federal practice by partnering with companies that act as a reseller to the government. There are enormous benefits to partnering on a reseller’s GSA Schedule as part of your government sales strategy.

Read More

Share

Blog Feature

GSA Schedule | Technology | Contracts

New Schedule 70 Health IT SIN

By: David Baldino
February 19th, 2016

In recent years, GSA has been trying to adapt to the continuous evolution of the Health IT market. In order to reach this goal, they worked closely with vendors within the industry to help create and finalize a new Health IT SIN.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Technology

Personal Email Breaches – The Keys to an Organization’s Most Sensitive Data

By: Kevin Lancaster
October 26th, 2015

CIA Director John Brennan’s personal @AOL.com email account was hacked into by a high school student and his personal information was exposed on WikiLeaks on October 21, 2015. They published his Social Security numbers, passport numbers, credit card and addresses of his family and associates. In addition, they released emails and documents generated before Brennan’s time in the Obama administration and while it did not contain classified government information, this has triggered great concern within the intelligence community and U.S. Government.

Read More

Share

Blog Feature

Technology

Ashley Madison Breach Exposes More Than Just Cheating

By: Kevin Lancaster
August 24th, 2015

The recent Ashley Madison hack doesn’t just have divorce attorneys and spouses scrambling. Federal, municipal and plenty of private sector employers are all on high alert. And they should be.

Read More

Share

Blog Feature

Technology

The Privacy Act of 1974

By: Kevin Lancaster
June 2nd, 2015

Data breaches are becoming one of government’s highest IT concerns. It is no longer a question of IF, but WHEN a data breach will occur. According to an April 2014 GAO report titled “Information Security - Agencies Need to Improve Cyber Incident Response Practices”, security incidents at Federal Agencies that have involved the probable exposure of citizens’ personal information have increased from 10,400 to 25,500 plus, between 2009 and 2013. This increase has Federal Agencies turning to the requirements set forth in the Privacy Act of 1974.

Read More

Share

Blog Feature

Technology

Government Data Breaches Show the Interconnectedness of Unrelated Cyber Attacks

By: Kevin Lancaster
May 27th, 2015

The IRS has announced that over 104,000 taxpayers have had their personal data stolen, including names, dates of birth, and social security numbers, as the result of a data breach last month. The repercussions of this data breach have been severe for those affected, as hackers have already been able to use the stolen past tax returns to submit fraudulent tax returns under their stolen identity and direct the tax refunds to prepaid debit cards. As a result of government data breaches, the IRS has announced that over 200,000 tax returns were received from “questionable” email domains, and it is estimated that 100,000 were able to clear the IRS’ authentication system.

Read More

Share