by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 15, 2016
Trending VA staffers are being transferred to the Office of Information and Technology, according to VA’s fiscal 2017 budget summary 599 As the final hours ticked away for con- tractors to bid on the General Services Administration’s $50 billion Enterprise Infrastructure Solutions contract, a small service company filed a pre-award protest, saying it has continually been unable to access the System for Award Management portal that GSA uses to collect bid submissions. Compuline International filed its pro- test with the Government Accountabil- ity Office on Feb. 17 and asked that it be allowed to submit its bid to GSA via email or on a flash drive. In amendment documents for the Enterprise Infrastructure Solutions contract, GSA said the protest would not postpone the Feb. 22 deadline for bid submissions or the evaluation of those bids. However, GSA said it would not award the contract until after GAO issues its decision, which is scheduled for May 26. — Mark Rockwell A government audit of the contractor at the center of the Office of Personnel Management breach has found serious flaws in the company’s IT security at the time of the hack. According to OPM’s inspector gen- eral, KeyPoint Government Solutions lacked a formal incident response pro- cedure and the security controls neces- sary to prevent unauthorized devices from connecting to the network. At the time of the audit, KeyPoint did not have a standard for configuring its firewalls and had not implemented an outbound web proxy, according to the IG. The contractor also lacked a process for regularly auditing configuration set- tings on its workstations, servers and databases. The absence of a configura- tion audit program “increases the risk that insecurely configured servers exist undetected, creating a potential gateway for malicious virus and hacking activity,” the audit states. In addition, investigators said Key- Point had no formal process for auditing physical access privileges or reviewing system logs. OPM’s CIO office generally concurred with the IG’s recommendations while saying that KeyPoint had rectified or addressed many of the flaws in its secu- rity controls. — Sean Lyngaas $50B telecom contract protested 10 March 15, 2016 FCW.COM We want to know what you think. Take the 2016 FCW Reader Survey today! FCW.com/ReaderSurvey IG details OPM contractor’s security flaws 031516fcw_003-010.indd 10 2/24/16 9:50 AM
March 30, 2016