Five Months After the OPM Attack.

Katherine-Archuleta-Reuters-500x293.jpg

U.S. Office of Personnel Management (OPM) Director Katherine Archuleta rubs her eyes, as she testifies before a House Committee on Oversight and Government


The 21.5 million victims of the largest known breach of federal personnel data will begin receiving notifications at the end of September five months after the government first discovered the incident.
 
In announcing an initial $133 million award for protection services to a company called "ID Experts," US officials said they proceeded with caution to ensure they do not further inconvenience victims. The government plans to offer three years of credit and identity-protection services to impacted personnel, which brings the total value of the contract through December 2018 to more than $329.8 million.

While notices detailing the safeguards will not be sent until the end of the month, affected individuals are covered as of Tuesday, Office of Personnel Management officials said. The attack struck databases maintained by OPM.
Brokering a breach response contract "is something that has taken some time, because we want to do it right,” OPM Acting Director Beth Cobert said in a Tuesday evening call with reporters.
“And we also want to make sure that in the context of the notifications, we don't create any more national security issues than we have through the data that was stolen," she said. "As somebody whose data was stolen in this incident as well as in the previous one, I can understand the frustration that people feel. But we want to make sure that we're doing this right." 
The resources available, as previously announced, include credit monitoring, ID theft monitoring, ID theft insurance and ID restoration services for three years.

The giant hack, allegedly linked to Chinese spies, compromised the personal security of millions of past and present federal employees, personnel applying for "clearances" to handle classified secrets, and their family members. Clearance forms detail the medical histories, sex lives and other sensitive details of government officials who now could be subjected to blackmail, security experts say.

Portland-based I.D. Experts specializes in, among other things, medical identity theft, and the company was tapped by UCLA Health System in July to protect 4.5 million patients affected by a network breach there.
Experts familiar with the national security implications of the government data stolen helped OPM decide which protections to offer, officials said.
OPM “concluded that this was the appropriate set of services to offer for individuals given what has been taken," Cobert said.

Some of the 4.2 million victims of a smaller, related hack of personnel records complained that notifications received in response to that incident looked like malicious emails. The notifications, sent by contractor CSID, came from a dot-com email address and contained a link to a commercial website. This time, email notifications will come from either a dot-mil or dot-gov address, Cobert said.

The Defense Department -- instead of the contractor -- will be alerting all victims this go-round, officials added.
"We have the infrastructure and the logistics system to be able to accommodate such a massive notification," said Rear Adm. Althea "Allie" Coetzee, principal deputy for defense procurement and acquisition policy. "We believed that it would be a lot better handled and managed if one entity handled it -- coming from a government entity as opposed to a contractor.”
Notification by contractor "was definitely not part of the scope of work" of the contract, she added.
Security controls on the vendors’ own systems was a consideration during the vetting process, officials said.
OPM conferred with a team of cybersecurity, privacy, contracting and legal experts from agencies across the federal government, including the Pentagon and Federal Trade Commission, to help develop security provisions.
Companies competing for the project all submitted formal security plans as a part of their proposals. The government has a right to enter I.D. Experts’ facilities to make sure safeguards comply with the contract specifications, officials said.
"We got the expertise from several different perspectives and through that, we believe that we have the best security protections that are available currently," Cobert said.

The General Services Administration on Tuesday also announced winners of a $500 million five-year award to handle ID protection services for government breaches going forward.

Along with I.D. Experts, agreements were also inked with Bearak Reports, also known as "Identity Force," and Ladlas Prince. Services for OPM victims were purchased through the blanket deal.
Nextgov: http://bit.ly/1USONuS

 

« Russia & China Use Hacked Databases to Find US Spies
North Korean Leader Has His Own Cellular Network »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

SISA

SISA

SISA is a payment security specialist providing payment security assurance services, training and products to over 1,000 customers across the globe.

KPN

KPN

KPN is a leading supplier of ICT services including Cyber Security, Identity & Privacy, Secure Communications and Business Continuity.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Secucloud

Secucloud

Secucloud GmbH is a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform, particularly for providers.

UNIDIR Cyber Policy Portal

UNIDIR Cyber Policy Portal

The UNIDIR Cyber Policy Portal is an online reference tool that maps the cybersecurity and cybersecurity-related policy landscape.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.