Archives page

Posts Tagged ‘NCSAM’

Cyber Security Compliance for Government Contractors

In honor of National Cyber Security Awareness Month, join GTSC and Strategic Partner Dickstein Shapiro for a look at what you need to do today to be cyber compliant with government requirements.  Also learn what compliance issues may be ahead with several important initiatives from NIST and GSA-DOD.

“Cyber Security Compliance for Government contractors:  What You Need to Know to Stay Ahead of the Curve”

SPEAKERS:

Justin Chiarodo, Partner

Andrew Smith, Associate

dickstein-shapiro-451x392

Click here to hear this important Webinar.

Take the Cyber Security Survey Today

Annually, the Government Technology & Services Coalition joins forces with InfraGard of the National Capital Region to survey our members and other private sector companies to help understand the cyber security environment, threats and trends.  We do this during Cyber Security Awareness month to bring attention to this critical homeland and national security issue and to constantly inform our products and services to help you identify, mitigate and prevent cyber attacks.

This cyber security survey was created to produce an estimate of cyber security incidents occurring in the private and non-profit sector, focusing heavily on companies operating in the Washington, D.C. region. The survey seeks to understand the private sector’s awareness, understanding, preparedness and gaps related to cyber security intrusions and attacks. The results will provide the basis for enhancing or initiating efforts to strengthen the information sharing and awareness to inform our public private partnerships and create meaningful programming and tools to combat the cyber threat.

Survey Scope: The survey collects data on the type and frequency of computer security incidents in which a computer was used as the means of committing a crime against the company or as a conduit through which other intrusion and/or criminal activity was perpetrated. It also collects data about the type and size of the company, cyber security practices, and computer infrastructure.

Reporting Period: The reporting period for this survey is calendar year 2013.

Survey Confidentiality: Your responses to this survey will be seen by individuals from the sponsoring entities who agree to uphold the confidentiality of your responses and use the information only for statistical/reporting purposes from which no individual company or entity will be identified.
start survey

Get Smart About Mobile Devices

You must protect your network when you travel.

LeapFrog - Mobile Devices

I’m on the prowl for chances to intercept your data. SmartPhones, iPads, BlackBerrys and other mobile devices help you stay connected and allow you to take your data with you. Because they connect to the Internet using wireless connections, they present opportunities for bad guys to pick off the most sensitive company information. Next thing you know, I’m exchanging high fives with a hacker in the end zone.

PDN_MalWareDownloading the global address list and storing sensitive client information or email discussions on your mobile device adds risk of unauthorized disclosure.

Don’t fumble your data when using mobile devices:

• Kick that app. Be careful what you get at the app store. Applications and freeware often contain hidden viruses and spyware that could put your device and the information on it at risk.

• Block that Bluetooth! When not in use, change the default password for connecting to a Bluetooth-enabled device.

• Be a textual deviate. Your text messages are not secure. Texts are transmitted over your carrier’s network, not a secure company network. The files you send are not encrypted and won’t be scanned by your company’s network virus protection.

• Huddle up on WiFi. Free, public WiFi service can be extremely insecure. Don’t make it easy for me. Be your own WiFi hot spot.

• Kick the GPS habit. GPS is useful when you need it; but it can also publish your current and past locations. Turn it off unless in use.

• Use a playbook. Keep track of where your mobile device is at all times and lock it when not in use to prevent loss or theft.

Don’t let your mobile device get sacked. Protect — don’t neglect!

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

 

 

Oct. 16: Mentor Session with Harris IT Services

Join the Government Technology & Services Coalition for a Mentor Session with Mr. Keith Bryars, the Client Executive for National Security and Federal Law Enforcement at Harris Harris IT Services on Wednesday, October 16.

About Harris IT Services

A leading provider of end-to-end solutions in mission-critical IT transformation, managed solutions, and information assurance for defense, intelligence, homeland security, civil and commercial customers. With over 3,300 professionals worldwide, Harris IT Services offers demonstrated past performance, proven technical expertise and innovative solutions in supporting large-scale IT programs that encompass the full technology lifecycle.

About Keith Bryars, Client Executive

Keith Bryars is a client executive with Harris IT Services. Harris IT Services designs, deploys, and operates secure communications systems and information networks with optimal reliability and affordability for high-profile customers in government and commercial markets, delivering expertise in cloud services, cyber security/information assurance, enterprise managed services, mobility, and systems integration worldwide.

Mr. Bryars joined Harris Corporation in April 2012 following a 25-year career as a senior executive special agent with the Federal Bureau of Investigation (FBI). Throughout his FBI career, Mr. Bryars was involved in a number of significant highprofile investigations involving counterterrorism, cybersecurity, counterintelligence, public corruption, and violent crimes. He is considered a subject matter expert in Federal Law Enforcement and National Security matters.

At the FBI, Mr. Bryars led and managed field operations across the country and served in the FBI’s Kansas City, Miami, Nashville, Birmingham, and Washington field offices, and at FBI headquarters in Washington, DC. As an FBI senior executive, Mr. Bryars helped lead the FBI’s strategic transformation, post-9/11, to an intelligence-led, threat-driven organization.

He also served as a senior executive at the FBI’s Engineering Research Facility at the Operational Technology Division at Quantico, Virginia, where he oversaw all of the FBI’s technical programs supporting FBI field operations and intelligence collection, and directed a variety of technical capabilities and operational technology support to the FBI and other Federal Law Enforcement and National Security partners.

Before his FBI career, Mr. Bryars worked as a mechanical engineer in the nuclear power industry.

Mr. Bryars holds a bachelor’s degree in mechanical engineering from Auburn University.

Harris is an international communications and information technology company serving government and commercial markets in more than 125 countries. Harris is dedicated to developing best-in-class assured communications® products, systems, and services.

About GTSC’s Mentor Companies

The Government Technology & Services Coalition’s (GTSC) Mentor companies understand how critical a robust, successful homeland and national security market is to our nation’s security.  Together with our members, these firms are committed to bringing the innovation, ideas and agility of small business to the experience, infrastructure and resources of large companies.  GTSC mentors join us to provide advice and counsel to small and mid-sized companies, find new and innovative teaming partners, address challenges in the prime/subcontractor relationship in a neutral environment and improve mentor/protégé communication and success.  Both our large and small companies recognize that the best security for our citizens – both physically and economically — is derived from the ability of our markets to meet the challenges posed by terrorism, natural disasters, and criminal activity.

 

Register now

Removable Media: Do You Know Where That’s Been?

LeapFrog Tip #2 Removable MediaSteer clear of portable malware by using only secure removable media

Admit it. You can’t resist plugging those cute little USB thumb drives, miniature CD ROMS and other removable media devices into your computer. They’re easy to use, portable, convenient and they hold lots of data.

PDN_MalWareBut my hacker friends and I discovered that those nifty memory devices are a great way to get into your computer and your network — especially if you don’t know where they came from. We hand them out everywhere we go. Everybody wants one. We pre-infect them with malware or spyware. The second you plug them into your USB port, presto! I’m running around your computer, free and easy.

Sure, it’s handy to download files onto a thumb drive and take them home with you instead of lugging your laptop around. But humans have a propensity to lose things. People misplace their thumb drives or CD ROMS all the time. Because they are so small, it’s pretty easy to steal them, too.

But you can protect yourself, your computer and your network. Just follow these easy tips:

  • If you don’t know where it came from, don’t put it in your computer.
  • Safeguard your memory sticks. Keep them in a safe place.
  • Use encryption. Protect sensitive data on your thumb drives.
  • Print hard copies of documents and back up data on removable media.

Remember, losing a memory stick that contains important data could have severe consequences. Protect, don’t neglect! For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].

Get Smart About Your Password

LeapFrog Banner #1You shared your password … now I know all your secrets. Don’t get exposed — be smart about your password!

PDN_MalWareThe attacker who writes my code is on the hunt for your password. Once he gets it, he inserts me, Mal Ware, into your network so he can see all the information that your employees need to keep private. I love taking secrets that aren’t mine and using them to do bad things. So don’t make it easy for me or your attacker.

Here are ways you can protect your information from my malicious intentions:

  • Keep your password to yourself. It’s supposed to be secret — so don’t share it!
  • Don’t be fooled by what others may say:
    • IT support does not need your password.
    • Your coworkers do not need your password to read your email. Share your inbox with another user or use a team email account.
    • Your assistant doesn’t need your password to do his/her job. You can give others access to your Outlook calendar and email.
    • Share file folder access with specific coworkers to avoid password sharing.
    • You don’t need to share your password with others to access the same sites or content management systems. Everyone with duties assigned on a system should have his/her own login and password.
    • Be creative to make your password uniquely yours:
      • Use a variety of symbols, letters, capital letters and numbers.
      • Avoid using words related to your company.
      • Avoid sequences or repetition of letters or numbers, words spelled backward, common misspellings or abbreviations.
      • Encourage others to be smart about their passwords. Make them aware of the threats that are out there if they share them, because once I have access to the network, I have access to everyone and everything.
      • A data breach could embarrass you and/or your company … or much worse.

It’s not difficult to avoid my threats. Just don’t share your password with anyone, and be smart when creating it. Protect, don’t neglect, your password! For more information, check out www.us-cert.gov.

Lisa Martin CEO LeapFrog Solutions, Inc.

Lisa Martin
CEO
LeapFrog Solutions, Inc.

LeapFrog Solutions (LFS) is a certified woman owned small business based in Fairfax, Virginia. Founded in 1996, we are a trusted source for commercial businesses and federal agencies seeking full spectrum creative solutions and exceptional program management. This blogpost is brought to you by GTSC in partnership with LeapFrog Solutions. For more information on cyber awareness campaigns contact Anjali Dighe at 703.539.6127 or [email protected].