Posts Tagged ‘DHA’

Are You Protected From Cybersecurity Threats?

Friday, April 4th, 2014

How important is cybersecurity in today’s increasingly cyber world? Well, a recent Lockheed Martin Cyber Security Alliance survey of federal, defense/military, and intelligence agencies found that 85% of respondents see cybersecurity as a high priority. And while most agencies believe they are “well prepared” to handle cyber threats, these agencies are constantly striving to improve the cyber efforts, including investments in mobile device initiatives, cloud computing, and more.177002377

Cybersecurity Threats

  • Malware
  • Phishing
  • Data Leaks
  • Cyber Espionage
  • Mobile
  • Misuse
  • Hacking
  • Spam
  • Social
  • Insider
  • And more!

“Government’s challenge is two-fold, adopting transformational technologies to help reduce operating costs while also keeping systems and data safe,” said Rick Johnson, Vice President and Chief Technology Officer, Lockheed Martin Information Systems & Global Solutions. “Our Lockheed Martin Cyber Security Alliance partners are keenly focused on collaboration and innovation to provide seamless end-to-end security with affordability in mind.”

Cybersecurity and your Business

What has your business done to protect itself from cyber threats?

While you may think you are safe, the truth is that hackers are beginning to target small and medium-sized businesses even more than larger businesses and government agencies. Why? Because, unlike government agencies and large Fortune 500 companies, smaller businesses typically do not have the cybersecurity measures in place to protect their critical data.

So what are you doing to protect your business?

DHA can help ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence. At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets. Our cybersecurity services include:

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

How Can I Build Security into Acquisition?

Wednesday, January 29th, 2014

According to a recent report, there are six new recommendations for incorporating security standards into the government’s acquisition process. Of these recommendations, one would ensure that agencies are only doing business with companies that comply with the security standards. In the past, President Obama has given the General Services Administration and Defense Department the task of providing recommendations on the, security benefits and merits of aligning cybersecurity standards with the acquisition process. The executive order also called on the agencies to provide steps for making consistent the existing cyber-related requirements for procurement.security

The recommendations given were:

  • Train the staff and government contractors on cybersecurity.
  • Develop definitions for cybersecurity and other related terms
  • Create and implement a cybersecurity risk management strategy
  • Increase government accountability for risk management in regards to cybersecurity.
  • Ensure that all equipment is purchased from original manufactures or an authorized reseller for added security.
  • Create a list of cybersecurity requirement and make sure companies comply with this.

The goal of these recommendations is to strengthen the federal government’s cybersecurity and improve management of the digital security.

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.federaltimes.com/article/20140129/ACQ02/301290005/6-ways-build-security-into-acquisition?odyssey=nav%7Chead

How Confident Are You With Your Cyber Security?

Thursday, December 12th, 2013

A recent report conducted for the National Cyber Security Alliance (NCSA), found that the majority of small businesses in the United States are overly confident in their current cybersecurity measures. But according to the report, they shouldn’t be! The report, which surveyed 1,015 small businesses, found that the majority of business owners are not doing enough.177002377

The survey found…

  • 86% of businesses surveyed said they are satisfied with the amount of security they provide to protect both customer or employee data.
  • 77% said a strong cybersecurity and online safety posture is good for their company’s brand.
  • Still, 66% said they aren’t concerned about cyberthreats.
  • Astonishingly, 87% of companies don’t have a formal written Internet security policy.
  • 67% of companies don’t even have an informal Internet security policy.
  • 59% don’t have a contingency plan in the event of a data breach.

But guess what? Like it or not, your small business is still at risk and vulnerable to cyberattacks. In fact, targeted cyberattacks aimed at small businesses have doubled this year, from 18% in 2011 to 36% in 2012. Furthermore, 90% of the payment data breach reports received by Visa come from small businesses.

Still feel confident in your cybersecurity efforts?

Cybersecurity Tips for Small Businesses

  1. Know what you need to protect and take the necessary measures to do so.
  2. Enforce strong password policies.
  3. Draft a disaster preparedness plan.
  4. Develop Internet security guidelines for employees.
  5. Educate employees about Internet safety practices.
  6. Trust DHA, Inc.

Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.

Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding Cybersecurity and IT Security, please contact DHA by visiting DHA-Inc.com today!

Innovative IT solutions are at the core of modern business, and robust, scalable models are necessary to achieve long-term success.  DHA can ensure your organization is keeping pace with technological advancements by applying new technologies with intelligence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Sources:

Report: SMBs Overconfident on Cybersecurity

Understanding Federal Acquisition Regulations

Monday, November 18th, 2013

The federal government is unlike commercial companies in the way it acquires products and services. The government is regulated by a complex set of rules, known as Federal Acquisition Regulations, or FAR.United States Capitol Dome

The Federal Acquisition Process

  1. Need recognition and acquisition planning
  2. Contract Formation
  3. Contract administration

FAR regulates the activities of government personnel in carrying out the above process. That is why you must understand these complex government methods, rules, requirements, and regulations before you ever hope to successfully acquire a government contract.

Understanding Federal Acquisition Regulations (FAR)

Before submitting a proposal and jumping into the realm of government contracting, it is important to familiarize yourself with FAR, which was established to help standardize the federal procurement process. FAR was issued as part of the Office of Federal Procurement Policy Act of 1974, and is codified in Title 48 of the United States Code of Federal Regulations.

Most federal government agencies and their contractors are required to comply with FAR, with the exceptions of the CIA, U.S. Postal Service, and FAA, which all have their own procurement regulations.

DHA Federal Acquisition Management (FAM)

DHA has extensive experience with the Federal acquisitions and can provide expert guidance on a “cradle-to-grave” basis, including assistance with both pre-award documents and post-award contract management.

If you have any questions regarding our Federal Acquisition Management, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Los Angeles Creates Cybersecurity Command Center

Tuesday, November 12th, 2013

Around the world e-security is one of our biggest threats to security. In Los Angeles, steps are being taken to combat the risks. The Cyber Intrusion Command Center was created to secure all city agencies against cyberattacks. The mayor of Los Angeles wants to make sure that the city is protected from all future potential cyberattacks.hacker

Technology allows the government to be more efficient at a lower cost, but security can be sometimes compromised. That’s where the cybersecurity command center comes in. The purpose of the command center is to protect the computer systems from potential hackers. Federal officials have warned city officials that the next terrorist attack could be through computers as technology continues to be more prevalent in society. The goal of the cybersecurity command center is to fight electronic terrorism.

The center will identify cyberthreats, ensure incidents are quickly investigated and see that information on the threats are sent out.

DHA Will provide your company with the cybersecurity protection it needs to help combat intruders and keep your data safe from prying eyes

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Source:

http://www.dailynews.com/government-and-politics/20131030/la-mayor-eric-garcetti-creates-cyber-security-command-center

How To Avoid Cyber Attacks

Monday, September 30th, 2013

A few months ago, LinkedIn, a business network site, was attacked. Hackers stole usernames and passwords, causing irrevocable damage. And if you thought that was an isolated incident, you were wrong! Websites get hacked all the time and the hackers steal passwords and other personal data. protection

Hackers use these usernames and passwords to try and access other online accounts, including bank accounts. Because of this and because of the reoccurrence of these cybersecurity issues, it is important to take your own measures to ensure your important data and personal information is safe.

Simple Cybersecurity Tips for Employees

  • Never use the Same Password Twice: One of the biggest mistakes users make is to use the same username and password for multiple sites.
  • Reset Passwords Regularly: Security experts advise people to regularly change their passwords.
  • Never Write your Password Down: Avoid writing passwords in pieces of paper. Yes, this makes it easier for you to reference, but it also makes you much more vulnerable.
  • Choosing Security Questions: When choosing your security question, do not use personal information or basic information that can be easily found online.
  • Completely Delete Documents: When deleting documents, make sure that you have completely removed it from the system.

DHA CyberSecurity Solutions for Businesses and Government Agencies

  • Vulnerability Assessment: This is the process of identifying and quantifying vulnerabilities in a system.
  • Penetration Testing: This is the process of simulating a cyber-attack by a hacker. The process involves an active analysis of the system for any weaknesses, technical flaws or vulnerabilities.

If you have any questions regarding our Cybersecurity Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

Cyber Security Tips from DHA, Your Management Consulting Firm in Washington, DC

Thursday, September 19th, 2013

When it comes to keeping your data safe, many people will go at great lengths to keep it safe and protected. However, sometimes certain security measures slip through the cracks. Below we have compiled a list of ways to keep you safe and enhance your cyber security.protection

  • Lock up your laptop – many computers come with an area that you can attach a lock to, this will help make sure that someone doesn’t actually physically steal your computer when you’re not watching it like a hawk.
  • Put a password on it – this will prevent people from having access to the documents on your computer.
  • Don’t reuse passwords – it becomes easier for a hacker to gain access to all of your accounts
  • Install an antivirus program – the software may be a little bit pricy, but it is cheaper than downloading a virus.

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies, such as the Department of Justice, including the Federal Bureau of Investigation; the U.S. Army; the Defense Logistics Agency; and the U.S. Patent and Trademark Office. DHA Group supports clients’ mission-critical work by delivering expert professional services, including program management, procurement and acquisition support, project and budget management, information assurance and cyber-security, information technology modernization and sustainment, data integration and information sharing, eDiscovery, systems engineering and business process reengineering. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about DHA Group and its capabilities, please visit us at www.dha-inc.com, call 202-347-9865, or join the conversation on FacebookLinkedInTwitter or Google+.

Source:

http://www.pcmag.com/article2/0,2817,2421835,00.asp

Are You Doing Enough to Protect Your Network?

Thursday, August 29th, 2013

As business and government agencies have evolved over the past 25 years, more and more information is being transported and stored online. In fact, nowadays, “Cyberspace” touches nearly every aspect of our lives. We are now more interconnected than ever before. Unfortunately, we are also more vulnerable.

So how do you protect your critical information?

With Cybersecurity and IT Services!

At DHA, we are experienced at providing IT Security support services within and around Federal Government systems and networks, and can help ensure the safety of your most critical IT assets.In between spaces

The Importance of Cybersecurity

President Barrack Obama called cyber-attacks “one of the most serious economic and national security threats our nation faces.” Because of this, the President conducted a complete review of the Federal Government’s efforts to defend its information and communications infrastructure.

How are you Leveraging Cybersecurity?

It doesn’t matter if you work for the federal government or the private sector, cybersecurity has become an important aspect of life. Your cybersecurity strategy should be twofold:

  1. Improve Resilience against Cyber-Attacks: This involves hardening your digital infrastructure to be more resistant to penetration and disruption. And, if an attack does happen, you must be able to recover quickly from the cyber incident.
  2. Reduce Cyber Threats: Implement best practices for cyberspace behavior and help deter potential vulnerabilities.

If you have any questions regarding our Cyber Security / IT Security Services, please contact DHA by visiting DHA-Inc.com today!

About DHA:

David F. Hale founded DHA Group, Inc. in 1994 to provide superior program management and operations support services to agencies within the Federal Government. Since June 2008, DHA has won many contract awards, including a Prime Contractor position on the prestigious Program Management Support Services (PMSS) contract with the FBI. DHA was also awarded an indefinite-delivery/indefinite-quantity (IDIQ) contract on the FBI’s $30 billion Information Technology Supplies and Support Services (IT Triple S) program to provide supplies, equipment, and IT services to support, maintain, and modernize the Bureau’s IT systems and architectures.

As we continue to expand into new areas of business, DHA remains committed to maintaining our high standards of service excellence.

You can also follow DHA on FacebookTwitterLinkedIn, and Google+.

The Benefits of Federal Acquisition Management Services

Friday, August 23rd, 2013

What is Federal Acquisition Management?United States Capitol Dome

Are ready to tap into the federal arena? You will need to familiarize yourself with the bidding process, the repercussions of a successful bid on company operations (workforce allocation, needed facility upgrades, etc.), and a host of other considerations. Or, you can outsource these responsibilities to a professional Federal Acquisition Management firm, like DHA.

DHA has extensive experience with the Federal Procurement Process.  Our employees are fluent in the language of government contracts, and our Federal Acquisition Management Services help our clients on a “cradle-to-grave” basis, from the creation of Pre-Award Documents to Post-Award Management.

What is Federal Procurement?

Federal procurement is the process used by every government agency and bureau to purchase or lease goods and services. The procurement process was put in place to offer fair competition to prospective bidders.

What are the Benefits of Federal Procurement?

An increasingly large portion of government spending is related to the contracting of services, such as administrative, management, and information technologies. In fact, more than half of the federal government’s total budget is designated for such services.

So why aren’t you taking advantage?

Expanding your business into the realm of federal contracting can be a great step in the right direction, but only if you know what you are getting into. Many are ill-prepared for the rules, laws, and regulations unique to those businesses under contract with the federal government.

How is Federal Procurement Regulated?

In the United States, federal procurement policies are determined by legislative action and by recommendations from the Office of Federal Procurement Policy. These policies are then published in the Federal Acquisition Regulation (FAR).

If you have any questions regarding our Federal Procurement or Federal Acquisition Mangement, please contact DHA by visiting DHA-Inc.com today!

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies, such as the Department of Justice, including the Federal Bureau of Investigation; the U.S. Army; the Defense Logistics Agency; and the U.S. Patent and Trademark Office. DHA Group supports clients’ mission-critical work by delivering expert professional services, including program management, procurement and acquisition support, project and budget management, information assurance and cyber-security, information technology modernization and sustainment, data integration and information sharing, eDiscovery, systems engineering and business process reengineering. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about DHA Group and its capabilities, please visit us at www.dha-inc.com, call 202-347-9865, or join the conversation on FacebookLinkedInTwitter or Google+.

Is Your Data Safer in the Cloud?

Wednesday, August 14th, 2013

When it comes to your data, you want to keep it as safe as possible. As internet connections become faster and more dependable, storing all of your data on the cloud becomes more enticing. As alluring as storing your data in the cloud is, there are still some concerns that need to be addressed.cloudstorage

  • Is your data private? It is important that your data is being kept safe and not being used for advertising purposes.
  • How available is your data? You want to be able to access it when you want or need it.
  • Is your data secured? It is important to make sure that your data cannot be hacked or stolen.
  • Where is your data being stored? If it is it hosted in another country, your data may be subject to different rules and regulations.

About DHA Group, Inc.

DHA Group, Inc., headquartered in Washington, D.C., is an award-winning management consulting and contracting firm primarily serving federal civilian and defense agencies, such as the Department of Justice, including the Federal Bureau of Investigation; the U.S. Army; the Defense Logistics Agency; and the U.S. Patent and Trademark Office. DHA Group supports clients’ mission-critical work by delivering expert professional services, including program management, procurement and acquisition support, project and budget management, information assurance and cyber-security, information technology modernization and sustainment, data integration and information sharing, eDiscovery, systems engineering and business process reengineering. Since DHA Group’s 1994 founding, our ability to improve productivity, cost effectiveness and efficiency has contributed to significant corporate growth and earned us a reputation for quality, value and excellence. For more information about DHA Group and its capabilities, please visit us at www.dha-inc.com, call 202-347-9865, or join the conversation on FacebookLinkedInTwitter or Google+.

Source:

http://www.techradar.com/us/news/internet/data-privacy-how-safe-is-your-data-in-the-cloud–1170332