The U.S. Office of Personnel Management (OPM) has still failed to implement over a third of the recommendations noted by government auditors after the devasting breach the organization faced in 2015.

Of the 80 recommendations laid out by the Government Accountability Office, 29 remain “open”. These recommendations include essential cybersecurity practices, such as installing the latest OS versions on networks supporting “high impact” systems.

Prohibiting multiple staff members from using the same admin accounts, enforcing password encryption at rest and in transit, and implementing procedures governing the use of special privileges on key computers were all missing from OPMs plans, leaving many to wonder if they are taking their role in security seriously.

The OPM still have not been able to prove to the GOA that it has reset all passwords following the breach, or that it installs critical patches in a timely fashion. Unsurprisingly, the OPM has also not been able to demonstrate that it periodically evaluates accounts to ensure privileged access is warranted, or accesses controls on certain systems as part of continuous monitoring.

Continuous monitoring is essential to any effective cybersecurity program. NNT Change Tracker Gen7R2 helps organizations identify suspicious activity using highly sophisticated contextual change control underpinned by threat intelligence to spot breach activity while reducing change noise.

“Until OPM implements these recommendations, its systems and information will be at increased risk of unauthorized access, use, disclosure, modification, or disruption,” a congressional briefing document noted.

The 2015 breach is believed to have been conducted by Chinese hackers after they obtained credentials from a contractor. This unlawful access was used to install backdoors and information-stealing malware on the department’s network, resulting in the exposure of 21.5 million sensitive records relating to former and current federal employees.

Fortunately, the OPM said it plans to implement 25 of the 29 open recommendations by the end of 2018 and three more by the end of the fiscal year 2019.


Read the article on Infosecurity Magazine



The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2023, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.