Are you getting serious about your information security yet? If government employee data can be hacked and stolen from a major security provider, so can yours.

In an article from August 7, 2014 entitled “Key Homeland Security contractor hacked, gov(erment) employee data likely stolen” rt.com explained how the Department of Homeland Security was cyber attached and numerous government employee’s personal information was stolen. That attached was believed to be a “state-sponsored” attack, meaning an attack by a Nation-State as a means to gain intelligence on our government, military, politics, economics and more. Although the originating source of the data breach as not identified, a similar incident which occurred in March and was eventually connected to China.

The company in question is USIS which is responsible for performing background checks and security clearance screening for Department of Homeland Security employees. To date, it is not yet known how much information was stolen or how many people the attack affected. As a precaution, all personnel have been notified. The Department has put their working relationship with USIS on hold until this is looked into further.

The news of this security breach comes just one day after the Wisconsin company Hold Security made an announcement that 1.2 billion usernames and passwords were stolen through a Russia-based cyber attack. It included over 500 million email addresses and was obtained from about 42,000 different websites making it the largest security breach the company had ever seen.

“Hackers did not just target US companies, they targeted any website they could get, ranging from Fortune 500 companies to very small websites,” Hold Security founder Alex Holden told The New York Times. “And most of these sites are still vulnerable.”
How secure is your business website? How about your personal email or mobile device? Albeit some security issues are out of our control if you choose to use them; such as when you store data remotely in the cloud and it gets breached. When companies like Apple fail to add security features to the iCloud preventing attacks such as the recent celebrity nude photo leak, it leaves all your valuable backed up data vulnerable. Just because a technology exists doesn’t mean it’s proven to be safe and secure. Its up to you to decide if using the technology is worth the risk.

The good news is that you can take several measures to protect yourself. You just need to be diligent, proactive and educate yourself on the technology you are using. The media is calling this World War C for the cyber warfare going on in the world hidden from the undiscerning eye. The target? –your information and digital assets.

Please check out the numerous articles on this website relating to how specifically you can secure your personal and business data. Check out articles in our folders titled “Protect Your Personal Information” and “Hot topics” for more information. Feel free to contact our office if you have any specific questions or would like a free consultation.

-Kelly Cory, President of Keystone Investigative Services, Inc.