Appears In

In 2021, the Office of Information and Technology accelerated VA’s digital transformation. Our IT specialists, developers, designers, and infrastructure experts delivered an exceptional customer experience while continuing to transform the way Veterans receive care and benefits. You can read more about our achievements this past year in our 2021 Year in Review, ConnectVA: Continuing VA’s Digital Transformation (PDF, 9MB).

ConnectVA highlights the efforts that are making VA one of the top federal providers in digital citizen services—making it easier for Veterans to find what they need when they need it. From a redesign of the VA.gov dashboard to the implementation of a new system that decreases wait times for community care, to the continued acceleration of VA claims approvals—Veterans, their families, and caregivers are reaping the benefits of VA’s digital transformation.

Take a deeper dive into ConnectVA. Here are examples of what you’ll find:

We’re proud of the work our team has accomplished in 2021. And we hope you’ll take a moment to read more about the Office of Information and Technology’s vision of a world-class organization that provides a seamless, unified Veteran experience through state-of-the-art technology.

IT Strategic Communication Program Named Team of the Year for COVID-19 Response
A flow chart which shows the process that hackers and thieves often execute to achieve the theft of personal information. The chart breaks this down the process into four different individual steps and examples. Step one: the attacker creates a fake webpage. Step two: the attacker sends a link to the victim, which leads to the fake webpage. These two steps are demonstrated by an image of a mask character pushing a large phone with a fake landing or login page pulled up on it to the end user. Step three: the victim opens the fake webpage and submits personal information. This step is depicted by an image of the end user interacting with the thief via the fake landing page. The thief and the user are communicating via their respective mobile devices in the image. Step four: the attacker collects the personal information of the victim. This step is depicted by an image of the thief holding up a magnet in front of the large phone and drawing letters and numbers out of the device which depict large chunks of data and personal information. The process then cycles back to step one which demonstrates the ability of the thief to reuse the same process to steal from another user.Hook, Line, and Sinker – How to Up Your Phishing Game

More stories