Understand the 2016 OPM Breach
Report – Prevention, Mitigation, and Incident Response
For executives and security practitioners alike, the Office of Personnel Management (OPM) breach is a potent warning of the daily threat of cyber attacks that hangs over us all. After all, if the United States government can be breached, what chance do private businesses have? While smaller businesses may think they are impervious to breaches, bad actors have a different idea. They gain easier access to large targets by infiltrating smaller, less well-protected organizations that serve as a proxy gateway. That may have been the case with the OPM breach.
The Attack: Occurrence and Scope
In June 2015, the U.S. government revealed that attackers had stolen personnel files from the Office of Personnel Management for some 21.5 million current and former federal employees. BlackBerry is honored to have served OPM as it identified the breach and moved forward to respond and secure their IT environment. OPM’s successful incident response efforts demonstrate how organizations can react to, mitigate, and future-proof against similar events.
Breaches Are Not Inevitable
For many, the popular misconception is that getting compromised is not a matter of if, but when. The links in the module below provide information that tells a different story. You have the power to put measures in place today to prevent attacks, now and into the future. Moreover, you can carry out specific steps to implement silent, secure, and sustainable prevention. By doing so, you proactively safeguard against threats before they occur. If needed, you can also detect and mitigate existing vulnerabilities and breaches.
Report And Evaluation
2016 Office of Personnel Management Official Report
Read the comprehensive findings of a yearlong federal investigation that served to assess and improve technology and processes that may have factored into the breach.
ThreatVector: OPM Breach Lessons Learned
Our author helps you gain an accurate understanding of how the OPM breach revealed important lessons you can use in your own endpoint protection plan to protect your organization.