ABM Federal Blog Posts & News

Simple and Secure Asset Management

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »

The Unknown Cybersecurity Threat: Printers

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »

Securing Your Endpoint Devices

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »

Three Reasons for Federal Agencies to Invest in MPS

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »

Educating Government Employees in Proper Cybersecurity Practice

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »

Edge Computing Trends for Federal Government

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »
Laptop Computer with Virus Alert on screen

Phishing Emails – What are they, What to…

Even though this is one of the simplest types of cyberattacks, phishing emails are also one of the most effective. It usually happens in the form of an email which appears to come from a trustworthy source, but is actually a fraudulent attempt to “bait” the user into giving up privileged information.

Read More »
GSA Federal Marketplace Strategy logo

What Makes FSSI OS4 a “Best-in-Class” (BIC) Contract?

OS4 cuts costs, reduces price variability, and increases efficiencies by buying everyday supplies such as pens, paper, and printing items from a list of contractors with negotiated low prices. In fact, OS4 builds on the success of OS3 by delivering even lower prices – on average, 15 percent!

Read More »
Washington Technology logo

GSA AdvantageSelect Overview

What if there was a program that provided tech users with state of the art, reliable, and secure laptop and desktop solutions and made acquisition fast and easy for contracting officers? The GSA AdvantageSelect program does just that!

Read More »
Insider Threats and Federal Office IT: What You Need to Know

Insider Threats and Federal Office IT: What You Need to Know

The primary risk factors associated with insider threats: excessive access privileges, an increasing number of devices with access to sensitive data, and complex IT. To address insider threats, organizations sometimes deploy data loss prevention, encryption, and identity and access management technologies.

Read More »