Your Cylance® Resource for
Understanding the OPM Breach

Access the report and view information you can use for your own breach
prevention, mitigation, and incident response plan.
A year ago, the U.S. government revealed that hackers had stolen personnel files from the Office of Personnel Management for some 21.5 million current and former federal employees. Cylance is honored to have served OPM as it identified the breach and moved forward to respond and secure their IT environment. OPM’s successful incident response efforts demonstrate how organizations can react to, mitigate and future-proof against similar events.

For executives and security practitioners alike, the OPM breach is a potent warning of the daily threat of cyberattack that hangs over us all. After all, if the United States government can be breached, what chance do private businesses have? And while smaller businesses may think they are impervious to breaches, bad actors have a different idea. They gain easier access to large targets by infiltrating smaller, less well-protected organizations that serve as a proxy gateway. That may have been the case with the OPM breach.
For many, the popular misconception is that getting compromised is not a matter of not if, but when. The below links provide you information that tells a different story. You have the power to put measures in place today to prevent attacks, now and into the future. Moreover, you can carry out specific steps to implement silent, secure, and sustainable prevention. By doing so, you proactively safeguard against threats before they occur. If needed, you can also detect and mitigate existing vulnerabilities and breaches.

Access the Official OPM Report. Take Advantage of the Below Resources.

The Official Office of Personnel Management 2016 Report

Read the comprehensive findings of a yearlong federal investigation that served to assess and improve technology and processes that may have factored into the breach.

Read The Report
Cylance OPM Breach
'Lessons Learned' Blog Post

Gain an accurate understanding of how the OPM breach revealed important lessons you can use in your own endpoint protection plan.

Read More
Cylance OPM Prevention and Response Infographic

Discover five simple steps to deploying an effective prevention and response program.

Get The Infographic