Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

Breach at Department of Homeland Security

You are here:
  1. Home
  2. Blog
  3. Breach at Department of Homeland…
Feb132018
BlogCyberSecurity

A DHS data breach was detected on May 2017 during a DHS Office of the Inspector General criminal investigation.  A former employee had unauthorized access to a copy of the department’s case management system. The exposure was made public on January 3, 2018; a total of 246,167 federal government employees’ PII was stolen. The stolen data affects all employees who were part of OIG investigations from 2002-2014, the stolen data includes subjects, witnesses and complainants. It is unknown who the employee was that caused the breach.

One lesson to learn from this, is any organization that closely follows a Cyber Risk Management Program that includes regular self-assessments using commonly accepted information security frameworks would have avoided such a breach.  Access Management is one of the fundamental areas of technical control policy that would have assured that former employees no longer could gain access to active accounts on the enterprise.

The DHS launched a privacy investigation that included an evaluation, a forensic analysis, and a comprehensive assessment which aimed to analyze the risk that the affected individuals might face. The DHS commented that the “privacy incident” was not a cyberattack and that the stolen Personally Identifiable Information (PII) did not seem to be the goal of the breach. The PII that was obtained had names, Social Security numbers, dates of birth, positions, pay grades and duty stations of DHS employees. It also compromised the OIG by stealing the names, Social Security numbers, dates of birth, alien registration numbers, among many other types of sensitive information. The DHS is giving the people affected by the breach free identity protection and credit-monitoring services for 18 months.

They also said they are taking steps to better improve their network security like placing additional limitations on who have access to the case management system. They also are adding additional network controls to better identify unusual access patterns and will also perform a 360-degree review of DHS OIG’s development practices related to the case management system. The vulnerability exploited would have never existed had the IT team responsible for giving read/write access to the right people done their job. Giving access to sensitive information to the wrong person could devastate any agency. When someone has unnecessary access to private information it could potentially ruin many lives and that’s something it can’t be easily fixed assuming it can be fixed.

References

https://www.cnet.com/news/homeland-security-breach-exposes-data-on-240000-employees/

https://www.bleepingcomputer.com/news/security/department-of-homeland-security-suffers-data-breach/

https://federalnewsradio.com/cybersecurity/2018/01/what-dhs-employees-need-to-know-about-oig-data-breach/

Categories: Blog, CyberSecurityBy Scott JohnstonFebruary 13, 2018
Tags: Access ControlCyber Risk ManagementCybersecurityCybersecurity Strategy

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:Article: Meet Scott Johnston of JohnsTek in Coral GablesNextNext post:NIST Releases Draft Special Publication 800-202, Quick Start Guide for Populating Mobile Test Devices

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer