Post-OPM Breach: Closing Today's Federal Security Gaps

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Post-OPM Breach: Closing Today's Federal Security Gaps-6 Next

Understand Where Federal Security Investments Should Be Headed

The government's current security investments are focused on continuous monitoring, where the main goal is to proactively protect and detect. While this is an effective approach, it cannot be the only safeguard used to protect private entities and the sensitive information they contain.

One area that is gaining attention in the public sector — yet is very expensive to implement — is data encryption. Sensitive, unencrypted information is rampant in government organizations, and is moving around complex, antiquated federal systems. Faced with the threat of unlimited, persistent online vulnerabilities and cyber terrorism, data encryption is one of the key ways to ensure that the data itself is protected if it gets into the hands of our enemies.

In summary, federal security investments should go to 1) bringing security systems up to CSF standards, 2) making sure that continuous monitoring is in place using the most appropriate technology systems, 3) ensuring that sensitive data is appropriately encrypted at rest and in transit and 4) retiring legacy systems and old technologies riddled with vulnerabilities.

Early in June it was reported that the Office of Personnel Management (OPM), a civilian-run government agency, experienced a data breach of its computer systems, giving suspected Chinese state-sponsored hackers access to up to four million records of former and current federal employees. The hack was so extensive that the retrieved information stemmed as far back as 1985. However, new reports show that the attack could be more than four times more devastating than initially estimated, and the number of people impacted could increase. In fact, the tally of those affected is now being revealed as the OPM sends out notices to people who are potentially impacted. Even more unnerving is that a 2014 audit uncovered security inadequacies within the OPM system, yet they were not reported until several months after detection.

Unlike previous major cyber attacks we have seen over the last year, the exposed data was not just limited to PII (Personally Identifiable Information) such as Social Security numbers, birthdates, and bank information. During this breach hackers accessed highly confidential employee background checks, containing information on their friends, family and past employment. Even private details such as mental illness treatments, lie detector test results, bankruptcy filings, and run-ins with the law were retrieved. At this point, according to Yo Delmar, vice president, GRC Solutions, MetricStream, we are unaware of the full impact of this breach; but if history is any indicator, it's highly likely that those responsible for the hack may already be using the stolen information in malicious, and highly illegal, ways.

Following the massive breach, what we must now focus on is what can be done at the federal level to prevent such devastating reoccurrences. According to Delmar, there are several steps that need to be taken in order to address today's security gaps in government. These include: fully understanding the details of the NIST's Cyber Security Framework (CSF) and actively putting practices into action; developing and implementing a remediation plan to ensure security standards are being met; closing the gap in response time and maintaining transparency throughout with key stakeholders; recognizing the auditor's evolved role in cybersecurity; and understanding where federal security investments should be headed.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.