RESTON, VA (November 9, 2022) – Govplace is proud to announce that it has been named 2023 Best Places to Work in Virginia by Virginia Business Magazine and Best Companies Group. At Govplace, the wellbeing and care of our team is of utmost importance, as they are the true driving force behind the company’s success. Their collective commitment to company [...]
How Govplace Approaches Zero Trust What Is Zero Trust? A Zero Trust approach is focused on data and service protection that is expanded to include all enterprise assets. These include devices, infrastructure components, applications, virtual and cloud components, as well as subjects such as end users, applications, and other nodes and entities that request information from [...]
Recognizing and Reporting Phishing Attacks #SeeYourselfInCyber Phishing attacks in data breaches increased 11% from 2019 to 2020. It went from 25% to 36% based on analysis of confirmed breaches. (Verizon) Phishing attacks have become an increasingly common problem for organizations of all sizes and can be very difficult to spot. 30% of small businesses [...]
Updating Your Software #SeeYourselfInCyber The Importance of Updating Your Software Nearly a third (31%) of US/UK respondents say they either “sometimes,” “rarely,” or “never” install software updates. (NCA) One of the easiest ways to keep information secure is to keep software and apps updated. Updates fix general software problems and provide new security patches where [...]
Using Strong Passwords and Password Management #SeeYourselfInCyber Why Using Strong Passwords Matters Did you know 53% of people rely on their memory to manage passwords? (Yubicos and Ponemon Institute) As our lives collectively expand online, we have gone from having a few passwords to managing upwards of 100 on current day. That’s 100 unique [...]
All Things Multi-Factor Authentication #SeeYourselfInCyber What is Multi-Factor Authentication? Multi-Factor Authentication is the practice of using two or more authentication prompts to verify a user’s identity and permissions, allowing access to system accounts and resources. Authentication is a critical part of cybersecurity and compliance, and access to data and resources often serve as a chokepoint [...]
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.