Gov. Jay Inslee is recognizing October as Cyber Security Awareness Month, a designation that comes on the heels of a summit between Maj. Gen. Bret Daugherty and Guard leaders from other states to help bolster the nation’s cybersecurity presence. Continue reading
As a partner in the Government Performance Consortium (GPC) initiative, we are excited to share with you a mini-documentary about the first Love of Cities Tour in Washington State, which has sparked tremendous excitement across our state for new ways to connect cities and citizens in co-creating more vibrant, healthy and resilient communities. Continue reading
The State Auditor’s Office is responsible for examining the financial affairs of all local governments in the state. We conduct more than 2,000 audits of local governments each year. Using the results of those audits, our Office then evaluates the overall patterns and that were reported. The audit exception that has been identified most frequently in the past several years is a lack of internal controls over accounting and financial reporting. Continue reading
Government auditing standards require our office to get a “peer review” every three years. For our 2016 peer review, a team of auditors from eight other states and a federal agency came to Olympia the week of September 12th to review our audit policies and manuals and a cross-section of audit reports and working papers. Continue reading
What is “Vishing”?
“Vishing” uses techniques that are essentially similar to phishing, the act of acquiring sensitive information via electronic communication while posing as a trusted entity. A vishing attack takes place over the telephone, using call spoofing, and tricks a user into disclosing personal information such as credit card numbers or a three digit security code.
Recent vishing attacks use an automated robo-caller stating that the victim’s security software was breached and requests them to call a number. Calling the number will connect the victim to a human who will attempt to access the victim’s workstation via Citrix remote access. Once they have access to your computer, they can do the following: Continue reading
Credit and procurement cards are easy to use, convenient and efficient. As a result, government use of these cards has increased exponentially over the last decade. Unfortunately, there can be a dark side to using cards: they often bypass standard, established payment controls. The combination of high card usage and weak controls is an environment ripe for fraud. Continue reading