Archive for the ‘Cyber Security’ Category

What is a Cyber Attack?

Wednesday, March 12th, 2014

Cyber SecurityThe past few months have been rife with cyber attacks and hackings. As technology evolves, people find ways to evolve with it and learn to overcome security features. A cyber attack is defined as “an attempt to damage or destroy a computer network or system,” by Google. Cyber attacks can come from individuals or even groups that have organized together to attack a specific person, company, or group. Some of the most recent cyber attacks include:

  • Target – With over 40 million credit card numbers stolen from Black Friday through the holiday season, Target’s security breach is one of the worst that has occurred so far.
  • Email breach – 360 million email addresses were recently hacked and include all the big platforms such as Google, Yahoo, and Microsoft. Emails can contain any number of personal details that can lead to identity theft.
  • Snapchat – Most people use Snapchat because you can take pictures, send them, and have them self-destruct within seconds. I’m sure you can see the issue with a cyber attack into Snapchat’s system, since they keep records of all of the pictures sent.

With all of the big companies and social media sites that have been hacked lately, it is becoming more and more important to understand cyber security and how to protect yourself and your information from the skilled hands of hackers. As a business, if your information is privy to a cyber attack, information from not only your business, but from other clients and companies can easily be stolen and preyed upon. Credit card numbers and other important personal information can be taken from your email address or social media sites if you’re not careful. Learn more about the importance of cyber security and consider hiring a consulting service to help keep your personal and professional information safe.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source: The Biggest Cyber Attack Ever Was Just Detected – 1.25 BILLION emails Hacked

Cybersecurity Includes Staying Safe From Computer Viruses

Friday, March 7th, 2014

Viruses and spyware are probably the worst things that could infect your computer. Not only will they slow down your machine, but they will cause great security threats to your personal data. So how can you keep your data safe and protect your computer?Virus in program code

Fortunately there are a few easy ways:

  • Install an antivirus program – an antivirus program needs to be kept up to date to do its job well. There are a variety of options available that vary on price and amount of coverage. It is best to do some research about each antivirus program to identify which one is right for you.
  • Be mindful of which emails you open – if you do not recognize the email sender, it may be a scam or include a harmful attachment. If you’re not familiar with the sender of the email, don’t open it. Potentially it can be dangerous and cause a lot of harm to your computer system.
  • Use a pop-up blocker- pop-ups are smaller browser windows that can appear on any website you are using. While many are advertisements, others can contain malicious software designed to give you a virus. A popup blocker can prevent this type of window from appearing.
  • Keep your software system updated – companies such as Apple and Windows periodically send out security updates. It is important to keep your computer updated to protect it from the latest security threats.
  • Clear your browsing history – when you’re using a public computer, consider clearing the browser history when you are done. This will protect you from leaving any personal information behind.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Cyber Security Careers are Encouraged By The Department of Homeland Security

Thursday, February 27th, 2014

The Department of Homeland Security (DHS) has recently created a cybersecurity fellowship designed to steer recent college graduates to careers in cybersecurity. The new Secretarial Honors Program will hire 50 workers across six areas, including IT, policy, management, and, of course, cybersecurity. Those selected for the program will experience:United States Capitol Dome

  • Departmental rotations
  • Mentorship
  • On-th-job training
  • Inclusion in numerous professional development programs

Furthermore, DHS has increased its own cyber workforce by 600% over the last few years in response to the ever increasing cyber threat. DHS’s National Cyber Security Division (NCSD) was established to build and maintain a national cybersecurity response system and implement a cyber-risk management program to help protect critical ifastructures.

NCSD Mission: To work collaboratively with public, private and international entities to secure cyberspace and America’s cyber assets.

Cybersecurity and the Private Sector

Is your business ready to fight back against cyber-attacks? If not, DHA can help. We can ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence.

DHA’s cybersecurity services include:

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source: DHS seeks Cyber Fellows

Cybersecurity Alert, Hackers Have Found A Security Alert in Internet Explorer

Thursday, February 20th, 2014

A group of hackers have recently found a security hole in the popular Internet browser Internet Explorer (versions 6, 7, 8, and 9), allowing the group to install the Poison Ivy Trojan on Windows computers. This malicious software allows the hackers to control the victim’s computer.+

Microsoft is aware of the issue and has issued a security advisory that includes an extensive list of work-arounds. Microsoft is also expected to come out with a patch in the near future.

“I would recommend not using Internet Explorer until this issue is patched,” said Sophos’ Chet Wisniewksi. “While the exploit is not in widespread use, it could be integrated into popular attack kits like the Blackhole Exploit Kit any time now.”

IE users should consider making the switch to Google Chrome, Mozilla Firefox, or Opera.

DHA CyberSecurity Solutions for Businesses and Government Agencies

  1. Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  2. Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Sources:

Hackers Just Found a Big Hole in Internet Explorer. Should You Switch Browsers?

What Is The Importance Of Cyber Security?

Wednesday, February 12th, 2014

Businesses and government agencies rely on computers and technology now more than ever before, for everything from communication and document management to accounting and pay roll. Because of this, Cyber security is becoming an increasingly important issue throughout both the federal government and the private sector.protection image

What is Cyber Security?

Cyber security involves the protection of information by not only responding to cyber attacks, but also through the prevention and detection of potential threats.

  • Hackers: People who seek to exploit weaknesses in software and computer systems for their own gain.
  • Malware: Malicious code, such as a computer virus, used to attack a computer or network.

Who is at Risk of a Cyber Attack?

EVERYONE is at risk; however some are more at risk than others. It all depends on your dependency on technology and your company’s or agency’s commitment to cybersecurity.

Cyber Security from DHA

DHA understands that the conveniences of technology come with a heightened need for security and protection.

  • Vulnerability Assessment: Identifying potential vulnerabilities in a network.
  • Penetration Testing: Simulating cyber attacks to help discover weaknesses, technical flaws or vulnerabilities within a network.

Benefits of Outsourced Cyber Security

  • Assessment: Assess your security platform and make suggestions to better your network security.
  • Cost Effective: Utilize an entire team of IT experts for a fraction of the cost of a full-time, in-house employee.
  • Proactive: Don’t wait for a cyber attack to cripple your network, actively be on the lookout for potential problems.

Stay Ahead of the Game: As we mentioned before, hackers are constantly finding new ways to manipulate your network. So you must continuously improve your Cyber security.

If you have any questions regarding our Cyber Security / IT Security Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Obama Calls for a Tougher Cyber Security Law

Tuesday, February 4th, 2014

Cyber security has recently been a hot button topic. After the massive cyber security breaches at Target and other major retailers, Obama wants to make sure that consumers are aware of security breaches if they are in danger of being affected, as well as prevent security breaches from happening again. The law that Obama wants to implement would make sure that the retailer notifies consumers of a potential breach so they can take any steps necessary to protect their personal data.no face hacker

The need for a law of this kind is in demand now more than ever because it seems like almost every day there is a report of a new security breach and many Americans are dealing with data theft.

One of the ways retailers can prevent hackers from gaining access to their system is with more advanced debit card scanners. However that could turn out to be very expensive for the retailers and could take years to adopt.

The main point in Obama’s new cyber security bill is that the consumers need to know when their information is at risk.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.usatoday.com/story/news/nation/2014/02/04/target-judiciary-data-breach/5200717/

How Can I Build Security into Acquisition?

Wednesday, January 29th, 2014

According to a recent report, there are six new recommendations for incorporating security standards into the government’s acquisition process. Of these recommendations, one would ensure that agencies are only doing business with companies that comply with the security standards. In the past, President Obama has given the General Services Administration and Defense Department the task of providing recommendations on the, security benefits and merits of aligning cybersecurity standards with the acquisition process. The executive order also called on the agencies to provide steps for making consistent the existing cyber-related requirements for procurement.security

The recommendations given were:

  • Train the staff and government contractors on cybersecurity.
  • Develop definitions for cybersecurity and other related terms
  • Create and implement a cybersecurity risk management strategy
  • Increase government accountability for risk management in regards to cybersecurity.
  • Ensure that all equipment is purchased from original manufactures or an authorized reseller for added security.
  • Create a list of cybersecurity requirement and make sure companies comply with this.

The goal of these recommendations is to strengthen the federal government’s cybersecurity and improve management of the digital security.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.federaltimes.com/article/20140129/ACQ02/301290005/6-ways-build-security-into-acquisition?odyssey=nav%7Chead

Vulnerability and Penetration Testing from DHA Group

Thursday, January 23rd, 2014

In today’s increasingly technologically advanced business world, Cybersecurity and IT security have to be at the forefront of modern business practices. With so many of today’s businesses relying on technology, managing network vulnerability is critical.Data Backup

Professional Vulnerability Assessments & Penetration Testing

DHA understands that the conveniences of technology come with a heightened need for security and protection.  DHA can ensure your organization is keeping pace with IT Security and Cybersecurity advancements by applying new technologies with intelligence. DHA can also ensure that your current network is as secure as possible. We do this in several ways, including Vulnerability Assessments & Penetration Testing.

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker.The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

Any security issue DHA finds will be presented to the system administrator along with an assessment of their impact and a proposal for mitigation or a technical solution.

At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets.

If you have any questions regarding our Cyber Security / IT Security Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Have I Been Pwned? Checking If My Accounts Are Secure

Wednesday, December 18th, 2013

There is a new website which launched recently and the main purpose is to identify if you’ve been pwned.

Pwned is internet slang for the word ‘owned’ and is used frequently to describe dominance over someone regarding the internet.

When your computer has been hacked and your personal data is now available to someone that you did not give consent to having it, that is considered being pwned.  When your data has been compromised, passwords or otherwise, it is best to change your password as soon as possible to protect yourself.

By going to http://haveibeenpwned.com/ and putting in your email address it can check any recent major security breaches and let you know if your account is safe or it has been compromised.

The website lets users know if their passwords were compromised in high-profile attacks against Adobe, Stratfor, Gawker, Yahoo, Pixel Federation, and Sony. All told the website currently scans more than 150 million compromised accounts.

Staying safe online is important and this website is an easy way to keep yourself safe!

How Confident Are You With Your Cyber Security?

Thursday, December 12th, 2013

A recent report conducted for the National Cyber Security Alliance (NCSA), found that the majority of small businesses in the United States are overly confident in their current cybersecurity measures. But according to the report, they shouldn’t be! The report, which surveyed 1,015 small businesses, found that the majority of business owners are not doing enough.177002377

The survey found…

  • 86% of businesses surveyed said they are satisfied with the amount of security they provide to protect both customer or employee data.
  • 77% said a strong cybersecurity and online safety posture is good for their company’s brand.
  • Still, 66% said they aren’t concerned about cyberthreats.
  • Astonishingly, 87% of companies don’t have a formal written Internet security policy.
  • 67% of companies don’t even have an informal Internet security policy.
  • 59% don’t have a contingency plan in the event of a data breach.

But guess what? Like it or not, your small business is still at risk and vulnerable to cyberattacks. In fact, targeted cyberattacks aimed at small businesses have doubled this year, from 18% in 2011 to 36% in 2012. Furthermore, 90% of the payment data breach reports received by Visa come from small businesses.

Still feel confident in your cybersecurity efforts?

Cybersecurity Tips for Small Businesses

  1. Know what you need to protect and take the necessary measures to do so.
  2. Enforce strong password policies.
  3. Draft a disaster preparedness plan.
  4. Develop Internet security guidelines for employees.
  5. Educate employees about Internet safety practices.
  6. Trust DHA, Inc.

Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.

Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.  DHA can ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Sources:

Report: SMBs Overconfident on Cybersecurity