Monthly Security Tips
TIP-32: Have a Backup Plan
Since your information could be lost or compromised (due to an equipment malfunction, an error, or an attack), make regular backups of your information so that you still have clean, complete copies. Backups also help you identify what has been changed or lost. If your computer has been infected, it is important to remove the infection before resuming your work. Keep in mind that if you did not realize that your computer was infected; your backups may also be compromised...
See more tips...
GNS WAS PART OF TWO WINNING IDIQ TEAMS
Software & Systems
Engineering Services (SSES) Next Generation (NexGen):
This is 5-Year contract with a $7B celling to support the U.S. Army
CECOM Software Engineering Center. Scope includes Life cycle software
solutions and services for warfighting, business, enterprise mission areas
along with management.
Information Technology Services Contract" (ITSC): This is 5-Year
contract with a $175M celling to support the Federal Bureau of Investigation
(FBI). Scope includes
personnel and facilities to design, develop, maintain, enhance and provide
operational support for automated systems that are, or will be, resident on
mainframes, minicomputers, servers and microcomputers.
DHS Revs Up Its Part Of The Cyber Executive Order
The Homeland Security Department will take the first step to move from
theory to practice under President Barack Obama's cyber executive order.
DHS' National Protections and Programs directorate in two weeks will launch
a voluntary program for companies to improve the security of their computers
"We will be launching what we call the voluntary program on Feb. 14,
enabling companies of all sizes to follow some basic cybersecurity policies
and due care that have been designed through the framework by the best
scientists in the private sector and the government that we have. [We are]
looking at how we can incentivize companies, again of all sizes, to be more
secure, to en
able big companies to share their best practices, to drive markets for small
to medium to enable economies of scale for companies that are smaller and
may not be able to afford to now have very good cybersecurity, [and] to have
a cybersecurity policy," said Phyllis Schneck, the deputy undersecretary for
cybersecurity at NPPD, in an exclusive interview with Federal News Radio.
"When I say to adopt the framework, that's to voluntarily either improve
your cybersecurity posture, follow some of the recommendations, engage in
our website portal, even if it's just to look at a critical infrastructure
resilience review. [There is] no need to report to us, but we want companies
of all sizes, the federal government and state and local to be more secure,
and we are committed to doing everything we can do get that framework
adopted. And that means helping companies not only adopt policy, but drive
markets to make good technology."
DHS will release the new voluntary program shortly after the National
Institute of Standards and Technology releases version 1 of the critical
infrastructure cybersecurity framework, which is due by Feb. 13.
President Barack Obama issued an executive order in February 2013 detailing
steps the government and industry would take together to
in both sectors.
The General Services Administration and the Defense Department delivered on
another Executive Order requirement last week with the
release of six recommendations
for improving how agencies integrate cybersecurity into federal procurement
Courtesy of Federal News Radio
Copyright ©2013 GNS, INC.