Understand the 2016 OPM Breach

Cylance Report – Prevention, Mitigation, and Incident Response

For executives and security practitioners alike, the Office of Personnel Management (OPM) breach is a potent warning of the daily threat of cyber attacks that hangs over us all. After all, if the United States government can be breached, what chance do private businesses have? While smaller businesses may think they are impervious to breaches, bad actors have a different idea. They gain easier access to large targets by infiltrating smaller, less well-protected organizations that serve as a proxy gateway. That may have been the case with the OPM breach.
The Attack: Occurrence and Scope The Attack: Occurrence and Scope The Attack: Occurrence and Scope

The Attack: Occurrence and Scope

In June 2015, the U.S. government revealed that attackers had stolen personnel files from the Office of Personnel Management for some 21.5 million current and former federal employees. Cylance is honored to have served OPM as it identified the breach and moved forward to respond and secure their IT environment. OPM’s successful incident response efforts demonstrate how organizations can react to, mitigate, and future-proof against similar events.    
Breaches Are Not Inevitable Breaches Are Not Inevitable Breaches Are Not Inevitable

Breaches Are Not Inevitable

For many, the popular misconception is that getting compromised is not a matter of if, but when. The links in the module below provide information that tells a different story. You have the power to put measures in place today to prevent attacks, now and into the future. Moreover, you can carry out specific steps to implement silent, secure, and sustainable prevention. By doing so, you proactively safeguard against threats before they occur. If needed, you can also detect and mitigate existing vulnerabilities and breaches.    

Report And Evaluation

2016 Office of Personnel Management Official Report

Read the comprehensive findings of a yearlong federal investigation that served to assess and improve technology and processes that may have factored into the breach.    

ThreatVector: OPM Breach Lessons Learned

Our author helps you gain an accurate understanding of how the OPM breach revealed important lessons you can use in your own endpoint protection plan to protect your organization.

Next-Generation AI Endpoint Protection

Learn how Cylance uses artificial intelligence, algorithmic science, and machine learning to prevent cyber attacks, including zero-day threats, before they can deploy and cause damage or loss.    

The Next Generation of Cybersecurity Is Here

We use cookies to provide you a relevant user experience, analyze our traffic, and provide social media features. Read More

GOT IT