Phone: (202) 296-5505 Email: info@winvale.com

New Call-to-action

Winvale Blog

The latest insights for government contracting success, GSA Schedule assistance, & IT Manufacturer support.

Blog Feature

Technology

How User Credentials Are Stolen

By: Brian Dunn
May 21st, 2015

Already, 2015 has seen a substantial increase in cyber-attacks by cyber criminals to steal large volumes of data and credentials. These attacks include theft of users’ credentials—such as passwords, usernames, e-mail addresses—and other forms of Personally Identifiable Information (PII) used by customers, employees, and third parties. User credentials can be stolen in many ways and the cyber-attack taxonomy can be quite confusing. Among them can include:

Read More

Share

Blog Feature

Technology

Third Party Data Breaches - Not My Problem!

By: Kevin Lancaster
May 13th, 2015

We often hear from the public sector that web-based attacks that occur at companies like Adobe, Forbes, Sony, or Anthem are not their problem. Public Sector organizations secure their own networks with the best hardware, detection software, and penetration testing, and have in place stringent rules about passwords and top-notch use policies that ensure they are safe. In every case, the security chain is only as strong as its weakest link.

Read More

Share

Top 10 Reasons to Get on the GSA Schedule

Top 10 Reasons to Get on the GSA Schedule

Do you know what the real benefits of being on the GSA Schedule are? Learn the top 10 reasons (and advantages) why you should consider it.

Blog Feature

Technology

The Importance of Identity Management: Understanding the Lesson of the Target Breach

By: Kevin Lancaster
April 22nd, 2015

With the ever growing accessibility of personal devices to organizational networks, identity management has never been of higher importance in both the public and private sector. Organizations’ IT networks contain an endless amount of sensitive data, and without proper authentication protocols, this data is at constant risk of breach. In the commercial space, the retailer Target’s breach in late 2013 was a difficult reminder that not addressing cyber risks on every level of your organization can lead to severe ramifications and security compromises.

Read More

Share

Blog Feature

Technology

Cyber Attacks Increasing on Law Enforcement and Public Officials

By: Kevin Lancaster
April 16th, 2015

The Internet Crime Complaint Center (IC3), which is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), was designed to expand the reach of law enforcement on the local, state, and federal levels to combat against cyber attacks.

Read More

Share

Blog Feature

Technology

Is the New SIN for Cloud Services Rolling In? Not So Fast!

By: Kevin Lancaster
November 25th, 2014

The Office of the IT Schedule Programs wants to increased visibility and access of cloud services for all federal agencies. Great idea, right? Especially given that most agencies don’t really know how to buy cloud services. But adding a new Special Item Number (SIN) isn’t as easy as you might think; there are many decisions that need to be made and considerations to take into account. In July 2014, a Request for Information (RFI) was released in consideration for creating a new SIN for cloud computing services. After collecting and reviewing the responses, they gathered industry partners together to participate in an Industry Day event to further discuss and receive feedback regarding this new SIN.

Read More

Share

Blog Feature

Government Business Development | Technology | Resources and Insight

Spring Cleaning For Your Service Desk

By: Kevin Lancaster
April 1st, 2014

ITSM – Service Desk Ticket System Field and Categorization Simplification As anyone who owns a home or has a garage knows, we tend to collect stuff over time that we no longer need (or maybe never really needed) and then keep those items stored in places where they are in the way, or where they just simply look out of place. Maybe those items are now keeping us from seeing or even getting to the useful stuff that we are actually looking for. Well, this might also be the same problem that some of you are experiencing with those seldom or never used fields and selections in your Service Desk or Help Desk online ticketing systems. IT specialists would identify these as categorization selections like “PDA”, “dongle”, and “floppy drive”, or selections of application systems that they probably retired three years ago. These applications may even have fields that that no one uses anymore because they are not sure what those fields were intended for.

Read More

Share