Category

Blog Posts

Working With Thread… The New Social Fabric

By | Blog Posts | No Comments

By Janis Nagy, Chief Strategy Officer I wanted to let everyone know about a project VectorCSP is working on with Thread, a non-profit based out of Baltimore. Thread engages underperforming high school students confronting significant barriers outside of the classroom by providing each one with a family of committed volunteers and increased access to community resources. They foster students’ academic advancement and personal growth into self-motivated, resilient, and responsible citizens. Their results are amazing, and I encourage all of you to check out their website and Facebook page. VectorCSP is using the Optimizing Human Performance (OHP) Front End Analysis (FEA)™…

Read More

What to do between Proposal Submittal and Award Notification: How VectorCSP Transitions Contracts

By | Blog Posts | No Comments

By: Bob Burnett, Vice President of Business Development If you were to distill government contracting into two macro buckets, you would end up with two categories, pursuing work and doing work. For Business Development (BD) professionals, the pursuing work phase is where we live and breathe; despite that, we know that work is won or lost based on the doing work phase. Performance on current tasking is what drives increased technical capability, a great reputation, and highly rated Contractor Performance Assessment Reporting System (CPARS) from our clients. So, while BD folks may get the glory for “winning” new work, it is the…

Read More

Stoicism in Government Contracting – Part 4 – Speaking Latin

By | Blog Posts | No Comments

By Bob Burnett, Director of OASIS PMO In this final installment of the 4-part series on Stoicism in Government Contracting, we focus on three more themes identified by The Daily Stoic that typify stoicism, namely Kindness, Amor Fati, and Memento Mori. Yes, you are reading correctly…those last two ideals are written in Latin, but we will get to that shortly. If you have read the previous posts in this series, you know that the general intent is to demonstrate how themes found in the philosophy of stoicism can be of great use to those of us who support government contracting…

Read More

Creating a Social Media Presence for a Government Contracting Company

By | Blog Posts | No Comments

By: Frances Sherlock, Proposal Coordinator Like many small government contractors, VectorCSP has struggled to create a presence on social media. We had LinkedIn and Twitter profiles that we occasionally posted on. But there was no rhyme or reason to the posts – they happened when someone randomly remembered to post something. Was this bad? No. We had to push social media to the back burner while we focused on capture efforts and proposal bids. But that obviously didn’t help our social presence. An effective social media strategy requires consistently engaging, interacting, and posting in order to build a positive presence….

Read More

VectorCSP – Cut Through the Noise

By | Blog Posts | No Comments

By: Damien Walz, Vice President of Business Development At VectorCSP, we work to cut through the noise. The confusing noise of the complex bureaucracies of our customers, the trivial noise of some of our self-important beltway contracting counterparts, the droning noise of the latest management theories and business buzzwords, and the unending noise of purposeless meetings and meetings and meetings. We accept that there will always be noise. Therefore, we will forever work to cut through the noise on behalf of our: Employees, who want to contribute to meaningful and actionable solutions, Teammates, who want to know that we are…

Read More

Foreign Interests, Technology, and Operations Security

By | Blog Posts | No Comments

By David Wilson, Facility Security Officer and IT Manager In the business of government contracting, it is a huge mistake to ever let down your guard. There are adversarial groups, governments, and interests in all walks of life, and they are getting smarter, and much more technologically advanced. They understand the kinds of information and data they can use, and they understand how to get it. Here are a couple of recent examples. Until about a year and a half ago, Kaspersky antivirus was the product of choice for protecting your computers – work and home. It got the best…

Read More

Stoicism in Government Contracting – Part 3 – Don’t Give Up!

By | Blog Posts | No Comments

By Bob Burnett, Director of OASIS PMO In this third installment of the four-part series on Stoicism in Government Contracting, we focus on three more themes identified by The Daily Stoic that typify stoicism, namely: Duty, Pragmatism, and Resiliency. These traits are especially useful in the world of government contracting. Any government contractor doing their job well understands the importance of Duty, even if they don’t always consider how their function supports the larger picture. Any government contractor who has yet to go mad trying to keep up with the fickle and capricious nature of our federal government must possess…

Read More

The Very Real Danger of E-Mail Phishing Scams to Business Security

By | Blog Posts | No Comments

By David Wilson, Facility Security Officer and IT Manager E-mail security has been identified as one of the top threats, if not the top vulnerability in government and industry cyber-security. Millions of phishing attempts are made daily by hackers, automated bots, and sophisticated programs dredging for everything from identities to steal, to confidential information and embarrassing data that could be used for blackmail. The scope and size of these operations is vast, but in recent years, a more identifiable pattern has emerged. A recent article on MSN News from the Associated Press details how Russian hackers known by the code…

Read More

Security Begins With Individuals

By | Blog Posts | No Comments

By David Wilson, Facility Security Officer and IT Manager Identity theft is a serious problem for everyone, but an aspect that we often overlook is its impact on corporate security. In most scenarios, be it an insider threat type of breach or a cyber-intrusion of one flavor or another, the weak link in the security chain is personnel. Effective training and modified habits and behaviors are difficult to achieve and maintain, and with the ever-widening net of adversarial activity closing in, the complexity increases almost daily. A company’s best defense is to support and defend its employees. Say, as an…

Read More