Posts Tagged ‘cloud computing’

Are You Protected From Cybersecurity Threats?

Friday, April 4th, 2014

How important is cybersecurity in today’s increasingly cyber world? Well, a recent Lockheed Martin Cyber Security Alliance survey of federal, defense/military, and intelligence agencies found that 85% of respondents see cybersecurity as a high priority. And while most agencies believe they are “well prepared” to handle cyber threats, these agencies are constantly striving to improve the cyber efforts, including investments in mobile device initiatives, cloud computing, and more.177002377

Cybersecurity Threats

  • Malware
  • Phishing
  • Data Leaks
  • Cyber Espionage
  • Mobile
  • Misuse
  • Hacking
  • Spam
  • Social
  • Insider
  • And more!

“Government’s challenge is two-fold, adopting transformational technologies to help reduce operating costs while also keeping systems and data safe,” said Rick Johnson, Vice President and Chief Technology Officer, Lockheed Martin Information Systems & Global Solutions. “Our Lockheed Martin Cyber Security Alliance partners are keenly focused on collaboration and innovation to provide seamless end-to-end security with affordability in mind.”

Cybersecurity and your Business

What has your business done to protect itself from cyber threats?

While you may think you are safe, the truth is that hackers are beginning to target small and medium-sized businesses even more than larger businesses and government agencies. Why? Because, unlike government agencies and large Fortune 500 companies, smaller businesses typically do not have the cybersecurity measures in place to protect their critical data.

So what are you doing to protect your business?

DHA can help ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence. At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets. Our cybersecurity services include:

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

How Can I Build Security into Acquisition?

Wednesday, January 29th, 2014

According to a recent report, there are six new recommendations for incorporating security standards into the government’s acquisition process. Of these recommendations, one would ensure that agencies are only doing business with companies that comply with the security standards. In the past, President Obama has given the General Services Administration and Defense Department the task of providing recommendations on the, security benefits and merits of aligning cybersecurity standards with the acquisition process. The executive order also called on the agencies to provide steps for making consistent the existing cyber-related requirements for procurement.security

The recommendations given were:

  • Train the staff and government contractors on cybersecurity.
  • Develop definitions for cybersecurity and other related terms
  • Create and implement a cybersecurity risk management strategy
  • Increase government accountability for risk management in regards to cybersecurity.
  • Ensure that all equipment is purchased from original manufactures or an authorized reseller for added security.
  • Create a list of cybersecurity requirement and make sure companies comply with this.

The goal of these recommendations is to strengthen the federal government’s cybersecurity and improve management of the digital security.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.federaltimes.com/article/20140129/ACQ02/301290005/6-ways-build-security-into-acquisition?odyssey=nav%7Chead

How Confident Are You With Your Cyber Security?

Thursday, December 12th, 2013

A recent report conducted for the National Cyber Security Alliance (NCSA), found that the majority of small businesses in the United States are overly confident in their current cybersecurity measures. But according to the report, they shouldn’t be! The report, which surveyed 1,015 small businesses, found that the majority of business owners are not doing enough.177002377

The survey found…

  • 86% of businesses surveyed said they are satisfied with the amount of security they provide to protect both customer or employee data.
  • 77% said a strong cybersecurity and online safety posture is good for their company’s brand.
  • Still, 66% said they aren’t concerned about cyberthreats.
  • Astonishingly, 87% of companies don’t have a formal written Internet security policy.
  • 67% of companies don’t even have an informal Internet security policy.
  • 59% don’t have a contingency plan in the event of a data breach.

But guess what? Like it or not, your small business is still at risk and vulnerable to cyberattacks. In fact, targeted cyberattacks aimed at small businesses have doubled this year, from 18% in 2011 to 36% in 2012. Furthermore, 90% of the payment data breach reports received by Visa come from small businesses.

Still feel confident in your cybersecurity efforts?

Cybersecurity Tips for Small Businesses

  1. Know what you need to protect and take the necessary measures to do so.
  2. Enforce strong password policies.
  3. Draft a disaster preparedness plan.
  4. Develop Internet security guidelines for employees.
  5. Educate employees about Internet safety practices.
  6. Trust DHA, Inc.

Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.

Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.  DHA can ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Sources:

Report: SMBs Overconfident on Cybersecurity

Los Angeles Creates Cybersecurity Command Center

Tuesday, November 12th, 2013

Around the world e-security is one of our biggest threats to security. In Los Angeles, steps are being taken to combat the risks. The Cyber Intrusion Command Center was created to secure all city agencies against cyberattacks. The mayor of Los Angeles wants to make sure that the city is protected from all future potential cyberattacks.hacker

Technology allows the government to be more efficient at a lower cost, but security can be sometimes compromised. That’s where the cybersecurity command center comes in. The purpose of the command center is to protect the computer systems from potential hackers. Federal officials have warned city officials that the next terrorist attack could be through computers as technology continues to be more prevalent in society. The goal of the cybersecurity command center is to fight electronic terrorism.

The center will identify cyberthreats, ensure incidents are quickly investigated and see that information on the threats are sent out.

DHA Will provide your company with the cybersecurity protection it needs to help combat intruders and keep your data safe from prying eyes

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.dailynews.com/government-and-politics/20131030/la-mayor-eric-garcetti-creates-cyber-security-command-center

How To Avoid Cyber Attacks

Monday, September 30th, 2013

A few months ago, LinkedIn, a business network site, was attacked. Hackers stole usernames and passwords, causing irrevocable damage. And if you thought that was an isolated incident, you were wrong! Websites get hacked all the time and the hackers steal passwords and other personal data. protection

Hackers use these usernames and passwords to try and access other online accounts, including bank accounts. Because of this and because of the reoccurrence of these cybersecurity issues, it is important to take your own measures to ensure your important data and personal information is safe.

Simple Cybersecurity Tips for Employees

  • Never use the Same Password Twice: One of the biggest mistakes users make is to use the same username and password for multiple sites.
  • Reset Passwords Regularly: Security experts advise people to regularly change their passwords.
  • Never Write your Password Down: Avoid writing passwords in pieces of paper. Yes, this makes it easier for you to reference, but it also makes you much more vulnerable.
  • Choosing Security Questions: When choosing your security question, do not use personal information or basic information that can be easily found online.
  • Completely Delete Documents: When deleting documents, make sure that you have completely removed it from the system.

DHA CyberSecurity Solutions for Businesses and Government Agencies

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding our Cybersecurity Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Are You Doing Enough to Protect Your Network?

Thursday, August 29th, 2013

As business and government agencies have evolved over the past 25 years, more and more information is being transported and stored online. In fact, nowadays, “Cyberspace” touches nearly every aspect of our lives. We are now more interconnected than ever before. Unfortunately, we are also more vulnerable.

So how do you protect your critical information?

With Cybersecurity and IT Services!

At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets.In between spaces

The Importance of Cybersecurity

President Barrack Obama called cyber-attacks “one of the most serious economic and national security threats our nation faces.” Because of this, the President conducted a complete review of the Federal Government’s efforts to defend its information and communications infrastructure.

How are you Leveraging Cybersecurity?

It doesn’t matter if you work for the federal government or the private sector, cybersecurity has become an important aspect of life. Your cybersecurity strategy should be twofold:

  1. Improve Resilience against Cyber-Attacks: This involves hardening your digital infrastructure to be more resistant to penetration and disruption. And, if an attack does happen, you must be able to recover quickly from the cyber incident.
  2. Reduce Cyber Threats: Implement best practices for cyberspace behavior and help deter potential vulnerabilities.

If you have any questions regarding our Cyber Security / IT Security Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Is Your Data Safer in the Cloud?

Wednesday, August 14th, 2013

When it comes to your data, you want to keep it as safe as possible. As internet connections become faster and more dependable, storing all of your data on the cloud becomes more enticing. As alluring as storing your data in the cloud is, there are still some concerns that need to be addressed.cloudstorage

  • Is your data private? It is important that your data is being kept safe and not being used for advertising purposes.
  • How available is your data? You want to be able to access it when you want or need it.
  • Is your data secured? It is important to make sure that your data cannot be hacked or stolen.
  • Where is your data being stored? If it is it hosted in another country, your data may be subject to different rules and regulations.

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies, such as the Department of Justice, including the Federal Bureau of Investigation; the U.S. Army; the Defense Logistics Agency; and the U.S. Patent and Trademark Office. DHA Group supports clients’ mission-critical work by delivering expert professional services, including program management, procurement and acquisition support, project and budget management, information assurance and cyber-security, information technology modernization and sustainment, data integration and information sharing, eDiscovery, systems engineering and business process reengineering. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about DHA Group and its capabilities, please visit us at www.dha-inc.com, call 202-347-9865, or join the conversation on FacebookLinkedInTwitter or Google+.

Source:

http://www.techradar.com/us/news/internet/data-privacy-how-safe-is-your-data-in-the-cloud–1170332

How Safe Is Cloud Computing?

Friday, July 5th, 2013

More companies are beginning to swap their traditional tangible data storage for cloud storage, but how safe is cloud computing? While no system is one hundred percent reliable, cloud computing is actually safer than on-site data storage. The data stored in the cloud is protected by multiple levels of security. There are layers of firewalls, intrusion prevention systems, intrusion detection systems and other security practices in place to keep your data safe from prying eyes. In addition to the virtual security just mentioned, data centers are protected by physical security. This may include but is not limited to retina scanners, backup power generators, backup cooling systems and multiple network providers. With cloud storage, your data can include songs, pictures, videos and documents whether they’re business related or otherwise are safely protected in large data centers.Network servers and Earth globe

Each data center, or storage area network, stores and replicates your data and then it is stored at several data centers across the country. If there is an issue at a data center, most times it would go unknown to you because your data has stayed out of harm’s way due to the backing up and storage of data. With all of that being said, cloud computing seems to be the safest way to back up and protect your documents.

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies, such as the Department of Justice, including the Federal Bureau of Investigation; the U.S. Army; the Defense Logistics Agency; and the U.S. Patent and Trademark Office. DHA Group supports clients’ mission-critical work by delivering expert professional services, including program management, procurement and acquisition support, project and budget management, information assurance and cyber-security, information technology modernization and sustainment, data integration and information sharing, eDiscovery, systems engineering and business process reengineering. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about DHA Group and its capabilities, please visit us at www.dha-inc.com, call 202-347-9865, or join the conversation on Facebook, LinkedIn, Twitter or Google+.

Source:

http://cloudcomputingtopics.com/2013/05/how-safe-is-cloud-computing/