Posts Tagged ‘cyber security’

How the FBI Protects Against Cyber-Hacks

Monday, November 16th, 2015
Cyber Hacking

Information sharing helps protect against cyber-hacking.

You may remember the cyber-attack on Sony last year after they released the film “The Interview”. The comic farce, in which two men try to assassinate Kim Jong-un, was taken as a threat by North Koreans, who launched the cyber-attack as a response. While the FBI was able to figure out where the attack came from, it was still dangerous. James Clapper, the director of national intelligence, described the attack as “the most serious cyber-attack ever made against US interests”. Imagine that these kinds of attacks are directed at banks or sensitive government files. There are two main sources of cyber-attacks to protect from: crime-sponsored attacks that are used for extortion (criminals also make money by selling Malware), and state-sponsored attacks that are used for espionage. It takes constant vigilance to maintain our systems against cyber-attacks, and there are ways that we can ensure we have as safe a system as possible.

What is Information-Sharing?

Back in 2011, the Obama Administration proposed a reform that would make information-sharing easier, and since then, Congress has passed information-sharing bills every year. This kind of information-sharing technology allows for clues about potential hackers to be passed on to others. For example, if Oil Refinery A notices that someone is attempting to hack its systems, then it can pass that information on to Oil Refineries B, C, and D, so they can take preventative measures to keep from getting hacked. Obama’s reform this year has been to make it easier for information from the private sector to be shared with the government, which helps the government to prevent sophisticated cyber-attacks.

How Does Information-Sharing Help Me?

You have nothing to worry about when it comes to this type of information-sharing. The only information that is passed on is information that’s crucial to identifying hackers; things like IP addresses, routing information, and time stamps. Your personal information is not stored or collected. As it stands now, our information-sharing program still only creates a patchwork of security. We’re moving towards more security with security products—like anti-malware, antivirus, and intrusion protection systems—that scan for threats. Sharing crucial information is important to prevent cyber-attacks that affect American businesses and citizens directly. In 2013, US retailers were affected by point of sale malware called BlackPOS. You may remember how Target had to pay hack victims $10 million in damages after hackers stole bank card information for $40 million people from the Target in-store credit cards. Cyber-attacks get worse and worse every year, and it is up to companies like DHA Group, Inc. to stop them.

DHA Group, Inc.

An award-winning management consulting and contracting firm primarily serving federal, civilian and defense agencies, DHA group supports clients’ mission-critical work by delivering expert professional services. If you have more questions about automatic software whitelisting, contact DHA for knowledgeable service.

Follow us on social media on FacebookLinkedInTwitter or Google+.

Cyber Attack Highlights Importance of Cyber Security

Monday, July 7th, 2014

 

Cyber attacks have become commonplace in today’s digital sphere, a fact that serves to underscore the importance of a coordinated cyber security strategy for any operation. A reminder of this came this week as a hacker group based in Tunisia made public its intent to begin a cyber attack on banks and airport computer systems in the United States.

 

The group, known as The Tunisian Hackers Team, took credit for a previously attempted attack on U.S.-based banks in 2013, and this week plans to attempt new cyber attacks on more banks. The group is demanding that the U.S. remove its military presence from several countries in the Middle East.

 

According to the Steven Stalinksky, Executive Director of the Middle East Media Research Institute, the hackers capabilities are unknown, but should be taken seriously and suggest that more cyber attacks from hacker groups based in the area are imminent. Quoted in Homeland Security Today, Stalinksy noted:

 

It’s unclear how strong the THT’s capabilities really are – but their warning that they will be working to gain control of American airport computer and communication systems should be taken seriously by homeland security officials. These types of threats by Middle East and South Asia cybergroups are the new norm and will only be increasing in the future.

 

Cyber security is critical for any sensitive operation where asset protection is of the highest importance. DHA provides ISO, network and physical security, critical infrastructure protection, as well as risk and vulnerability management through penetration testing in order to safeguard the IT aspects of your operation. Cyber security will only continue to grow in importance, which is why it’s important to take preventative measures now and provide the maximum protection available for your operation. Contact us today for more information.

 

cyber security

 

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies. DHA Group supports clients’ mission-critical work by delivering expert professional services. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about Cyber Attack Highlights Importance of Cyber Security, please visit us atwww.dha-inc.com or call 202-347-9865, or join the conversation on FacebookLinkedInTwitter or Google+.

Source

http://www.hstoday.us/briefings/daily-news-analysis/single-article/exclusive-tunisian-hackers-announce-cyber-jihad-against-us-banks-airport-computer-systems/7c3d2373e69fa9319e521816ce539b7d.html

 

Are You Protected From Cybersecurity Threats?

Friday, April 4th, 2014

How important is cybersecurity in today’s increasingly cyber world? Well, a recent Lockheed Martin Cyber Security Alliance survey of federal, defense/military, and intelligence agencies found that 85% of respondents see cybersecurity as a high priority. And while most agencies believe they are “well prepared” to handle cyber threats, these agencies are constantly striving to improve the cyber efforts, including investments in mobile device initiatives, cloud computing, and more.177002377

Cybersecurity Threats

  • Malware
  • Phishing
  • Data Leaks
  • Cyber Espionage
  • Mobile
  • Misuse
  • Hacking
  • Spam
  • Social
  • Insider
  • And more!

“Government’s challenge is two-fold, adopting transformational technologies to help reduce operating costs while also keeping systems and data safe,” said Rick Johnson, Vice President and Chief Technology Officer, Lockheed Martin Information Systems & Global Solutions. “Our Lockheed Martin Cyber Security Alliance partners are keenly focused on collaboration and innovation to provide seamless end-to-end security with affordability in mind.”

Cybersecurity and your Business

What has your business done to protect itself from cyber threats?

While you may think you are safe, the truth is that hackers are beginning to target small and medium-sized businesses even more than larger businesses and government agencies. Why? Because, unlike government agencies and large Fortune 500 companies, smaller businesses typically do not have the cybersecurity measures in place to protect their critical data.

So what are you doing to protect your business?

DHA can help ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence. At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets. Our cybersecurity services include:

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

What is a Cyber Attack?

Wednesday, March 12th, 2014

Cyber SecurityThe past few months have been rife with cyber attacks and hackings. As technology evolves, people find ways to evolve with it and learn to overcome security features. A cyber attack is defined as “an attempt to damage or destroy a computer network or system,” by Google. Cyber attacks can come from individuals or even groups that have organized together to attack a specific person, company, or group. Some of the most recent cyber attacks include:

  • Target – With over 40 million credit card numbers stolen from Black Friday through the holiday season, Target’s security breach is one of the worst that has occurred so far.
  • Email breach – 360 million email addresses were recently hacked and include all the big platforms such as Google, Yahoo, and Microsoft. Emails can contain any number of personal details that can lead to identity theft.
  • Snapchat – Most people use Snapchat because you can take pictures, send them, and have them self-destruct within seconds. I’m sure you can see the issue with a cyber attack into Snapchat’s system, since they keep records of all of the pictures sent.

With all of the big companies and social media sites that have been hacked lately, it is becoming more and more important to understand cyber security and how to protect yourself and your information from the skilled hands of hackers. As a business, if your information is privy to a cyber attack, information from not only your business, but from other clients and companies can easily be stolen and preyed upon. Credit card numbers and other important personal information can be taken from your email address or social media sites if you’re not careful. Learn more about the importance of cyber security and consider hiring a consulting service to help keep your personal and professional information safe.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source: The Biggest Cyber Attack Ever Was Just Detected – 1.25 BILLION emails Hacked

How Can I Build Security into Acquisition?

Wednesday, January 29th, 2014

According to a recent report, there are six new recommendations for incorporating security standards into the government’s acquisition process. Of these recommendations, one would ensure that agencies are only doing business with companies that comply with the security standards. In the past, President Obama has given the General Services Administration and Defense Department the task of providing recommendations on the, security benefits and merits of aligning cybersecurity standards with the acquisition process. The executive order also called on the agencies to provide steps for making consistent the existing cyber-related requirements for procurement.security

The recommendations given were:

  • Train the staff and government contractors on cybersecurity.
  • Develop definitions for cybersecurity and other related terms
  • Create and implement a cybersecurity risk management strategy
  • Increase government accountability for risk management in regards to cybersecurity.
  • Ensure that all equipment is purchased from original manufactures or an authorized reseller for added security.
  • Create a list of cybersecurity requirement and make sure companies comply with this.

The goal of these recommendations is to strengthen the federal government’s cybersecurity and improve management of the digital security.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.federaltimes.com/article/20140129/ACQ02/301290005/6-ways-build-security-into-acquisition?odyssey=nav%7Chead

How Confident Are You With Your Cyber Security?

Thursday, December 12th, 2013

A recent report conducted for the National Cyber Security Alliance (NCSA), found that the majority of small businesses in the United States are overly confident in their current cybersecurity measures. But according to the report, they shouldn’t be! The report, which surveyed 1,015 small businesses, found that the majority of business owners are not doing enough.177002377

The survey found…

  • 86% of businesses surveyed said they are satisfied with the amount of security they provide to protect both customer or employee data.
  • 77% said a strong cybersecurity and online safety posture is good for their company’s brand.
  • Still, 66% said they aren’t concerned about cyberthreats.
  • Astonishingly, 87% of companies don’t have a formal written Internet security policy.
  • 67% of companies don’t even have an informal Internet security policy.
  • 59% don’t have a contingency plan in the event of a data breach.

But guess what? Like it or not, your small business is still at risk and vulnerable to cyberattacks. In fact, targeted cyberattacks aimed at small businesses have doubled this year, from 18% in 2011 to 36% in 2012. Furthermore, 90% of the payment data breach reports received by Visa come from small businesses.

Still feel confident in your cybersecurity efforts?

Cybersecurity Tips for Small Businesses

  1. Know what you need to protect and take the necessary measures to do so.
  2. Enforce strong password policies.
  3. Draft a disaster preparedness plan.
  4. Develop Internet security guidelines for employees.
  5. Educate employees about Internet safety practices.
  6. Trust DHA, Inc.

Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.

Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.  DHA can ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Sources:

Report: SMBs Overconfident on Cybersecurity

Los Angeles Creates Cybersecurity Command Center

Tuesday, November 12th, 2013

Around the world e-security is one of our biggest threats to security. In Los Angeles, steps are being taken to combat the risks. The Cyber Intrusion Command Center was created to secure all city agencies against cyberattacks. The mayor of Los Angeles wants to make sure that the city is protected from all future potential cyberattacks.hacker

Technology allows the government to be more efficient at a lower cost, but security can be sometimes compromised. That’s where the cybersecurity command center comes in. The purpose of the command center is to protect the computer systems from potential hackers. Federal officials have warned city officials that the next terrorist attack could be through computers as technology continues to be more prevalent in society. The goal of the cybersecurity command center is to fight electronic terrorism.

The center will identify cyberthreats, ensure incidents are quickly investigated and see that information on the threats are sent out.

DHA Will provide your company with the cybersecurity protection it needs to help combat intruders and keep your data safe from prying eyes

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.dailynews.com/government-and-politics/20131030/la-mayor-eric-garcetti-creates-cyber-security-command-center

How To Avoid Cyber Attacks

Monday, September 30th, 2013

A few months ago, LinkedIn, a business network site, was attacked. Hackers stole usernames and passwords, causing irrevocable damage. And if you thought that was an isolated incident, you were wrong! Websites get hacked all the time and the hackers steal passwords and other personal data. protection

Hackers use these usernames and passwords to try and access other online accounts, including bank accounts. Because of this and because of the reoccurrence of these cybersecurity issues, it is important to take your own measures to ensure your important data and personal information is safe.

Simple Cybersecurity Tips for Employees

  • Never use the Same Password Twice: One of the biggest mistakes users make is to use the same username and password for multiple sites.
  • Reset Passwords Regularly: Security experts advise people to regularly change their passwords.
  • Never Write your Password Down: Avoid writing passwords in pieces of paper. Yes, this makes it easier for you to reference, but it also makes you much more vulnerable.
  • Choosing Security Questions: When choosing your security question, do not use personal information or basic information that can be easily found online.
  • Completely Delete Documents: When deleting documents, make sure that you have completely removed it from the system.

DHA CyberSecurity Solutions for Businesses and Government Agencies

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding our Cybersecurity Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Cyber Security Tips from DHA, Your Management Consulting Firm in Washington, DC

Thursday, September 19th, 2013

When it comes to keeping your data safe, many people will go at great lengths to keep it safe and protected. However, sometimes certain security measures slip through the cracks. Below we have compiled a list of ways to keep you safe and enhance your cyber security.protection

  • Lock up your laptop – many computers come with an area that you can attach a lock to, this will help make sure that someone doesn’t actually physically steal your computer when you’re not watching it like a hawk.
  • Put a password on it – this will prevent people from having access to the documents on your computer.
  • Don’t reuse passwords – it becomes easier for a hacker to gain access to all of your accounts
  • Install an antivirus program – the software may be a little bit pricy, but it is cheaper than downloading a virus.

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies, such as the Department of Justice, including the Federal Bureau of Investigation; the U.S. Army; the Defense Logistics Agency; and the U.S. Patent and Trademark Office. DHA Group supports clients’ mission-critical work by delivering expert professional services, including program management, procurement and acquisition support, project and budget management, information assurance and cyber-security, information technology modernization and sustainment, data integration and information sharing, eDiscovery, systems engineering and business process reengineering. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about DHA Group and its capabilities, please visit us at www.dha-inc.com, call 202-347-9865, or join the conversation on FacebookLinkedInTwitter or Google+.

Source:

http://www.pcmag.com/article2/0,2817,2421835,00.asp

Are You Doing Enough to Protect Your Network?

Thursday, August 29th, 2013

As business and government agencies have evolved over the past 25 years, more and more information is being transported and stored online. In fact, nowadays, “Cyberspace” touches nearly every aspect of our lives. We are now more interconnected than ever before. Unfortunately, we are also more vulnerable.

So how do you protect your critical information?

With Cybersecurity and IT Services!

At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets.In between spaces

The Importance of Cybersecurity

President Barrack Obama called cyber-attacks “one of the most serious economic and national security threats our nation faces.” Because of this, the President conducted a complete review of the Federal Government’s efforts to defend its information and communications infrastructure.

How are you Leveraging Cybersecurity?

It doesn’t matter if you work for the federal government or the private sector, cybersecurity has become an important aspect of life. Your cybersecurity strategy should be twofold:

  1. Improve Resilience against Cyber-Attacks: This involves hardening your digital infrastructure to be more resistant to penetration and disruption. And, if an attack does happen, you must be able to recover quickly from the cyber incident.
  2. Reduce Cyber Threats: Implement best practices for cyberspace behavior and help deter potential vulnerabilities.

If you have any questions regarding our Cyber Security / IT Security Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.