An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
OIG determined whether Farm Service Agency (FSA) employees would recognize and respond to phishing email. OIG made three recommendations to OCIO and reached management decision on each of them.
We determined whether the Natural Resources Conservation Service (NRCS) timely submitted a spend plan for Watershed and Flood Prevention Operations (WFPO) funds and accurately reported Infrastructure Investment and Jobs Act (IIJA) data to the public, and we determined the methodology NRCS used for selecting projects for funding.
OIG reviewed and analyzed USDA default credentials vulnerability scans and followed up on a related prior audit recommendation. We also reviewed and evaluated the Department's policies and procedures, and we interviewed responsible USDA officials. OIG made three recommendations to OCIO and reached management decision on each of them.
OIG reviewed the Office of Contracting and Procurement’s procurement authority to prevent and respond to reported child labor violations in fiscal year 2023.
OIG reviewed the Forest Service to determine the likely level of sophistication an attacker would need to compromise selected USDA systems or data. OIG made one recommendation to FS and reached management decision on it.
We completed this informational report on a review of the Infrastructure Investment and Jobs Act (IIJA) Reconnect Program - Rural Utilities Service consideration and balance of broadband needs, as conducted by an independent certified public accounting firm.
In our final report, we reviewed key aspects of the Food and Nutrition Service funding and administration of Pandemic Electronic Benefits Transfer assistance.
The Office of Inspector General performed an inspection of the Forest Se1vice to determine the likely level of sophistication an attacker would need to compromise selected USDA systems or data.