GovCon

01

Jun'17

The 5 W’s of HUBZones: What Are They and How Do I Qualify?

A Historically Underutilized Business Zone (HUBZone), is a set-aside program designed to help businesses in economically underdeveloped areas. Set-asides like HUBZones are incredibly useful for government contractors who are trying to win federal contracts. Keep reading to learn more about this valuable program and  its eligibility requirements. Who can participate? Small businesses that have been …

Read More

29

May'17

IRS Announces Pre-Breach Identity Protection Services Are Non-Taxable

On December 30th, 2015, the IRS officially announced that employers are not required to include the value of pre-breach identity protection services in employee gross income. This adds to a previous announcement where the IRS stated in August 2015, with announcement 2015-22, that post-breach identity protection benefits would have preferential tax treatment. The most recent announcement extends …

Read More

25

May'17

5 Keys to Government Sales Success

How many times have you heard the phrase “failing to plan, is planning to fail”?  This happens every day in the B2G marketplace. Companies don’t take the time to fully understand what is required to enter, compete, and grow a successful government practice. Many companies fail to understand how to develop and expand their business …

Read More

25

May'17

Dark Web ID Tracks and Identifies DHS and FBI “Data Dumps” Immediately After Release

Last weekend, more than 9,300 Department of Homeland Security (DHS) employees’ personal information was leaked online, all stemming from an apparent data breach to the DHS networks. Not only were those identities exposed, but the Twitter user that publicized the information immediately followed suit by exposing an additional 22,000 Federal Bureau of Investigation (FBI) employees’ information. …

Read More

22

May'17

Five Steps to Protect Your C-Suite from Corporate Identity Theft

Since 2003, the FBI has tracked more than $740 million dollars lost to business email compromise (BEC) fraud in the United States. Who’s the main target? None other than the C-Suite. Led by organized online criminal groups, BEC is one of the fastest growing types of financial fraud. Company executives are more easily compromised than you may …

Read More

22

May'17

Working with a Prime: Your Benefits as a Veteran Owned Small Business

As a veteran-owned small business (VOSB) or a service-disabled veteran owned small business (SDVOSB), subcontracting can be the logical first step into the Federal Government marketplace. Participating in set-aside programs and putting forth quality goods and services will increase your chances of working with a prime contractor, and subsequently perpetuate your competitive edge. This partnership …

Read More

22

May'17

Building a Small Business from the Ground Up – Appealing to the Federal Government

Client Spotlight  – Avilar Technologies Inc, a Veteran Owned Small Business. At the dawn of the Internet era, Tom Grobicki, CEO of Avilar Technologies began envisioning a world with technological advances that would eventually propel the software industry and subsequently help the armed forces. After serving in the US Air Force and cultivating over 25 years …

Read More

18

May'17

Three Types of Business E-Mail Compromise Scams You Need to Recognize

The internet has changed the way businesses operate around the world. Having access to a tool of this caliber is essential to the way corporations function today, but it also has its downfalls. In this case, we’re referring to the incredibly dangerous threat most business owners are either unaware of or hardly ever think about …

Read More

15

May'17

Why Employee Data May Pose Biggest Cyber Risk

Cyber risk is no longer a potential threat to put on the back burner for later review. The reality is that cyber risk is a threat right now. Many organizations are taking precautions to protect themselves and their people. However, despite the plethora of major companies and brands experiencing the repercussions of not instilling pre-breach precautions, …

Read More

11

May'17

Are You Doing Enough to Protect Your Customers’ Data?

Protecting sensitive customer data on your networks isn’t just the right thing to do – it may now be a legally sanctioned practice. Recently the Federal Trade Commission (FTC) was granted broad authority to penalize companies that had inadequate cybersecurity practices in place to protect their customers’ information from data breaches. In the past, the …

Read More

About Us

Mastering the Federal, State and Local Government marketplace is no easy task. Because of this, we gathered the leading Government Contracting industry experts and created a FREE (no strings attached) community designed to train, educate and empower beginners and experts alike.

top
@ 2017 GOVERNMENTCONTRACT.COM
X