Cybersecurity

Data breach response leaves something to be desired

gold shield on top of computer code

The number of government data breaches involving personal identifiable information has more than doubled since 2009, and the Government Accountability Office wants federal agencies to adhere more closely to existing security protocols to better protect people’s data.

An April 2 GAO report found that the number of data breaches involving information such as taxpayer data, census data, Social Security information and patient health information have increased from 10,481 in 2009 to 25,566 in 2013, as reported to U.S. Computer Emergency Readiness Team.

GAO found that many agencies have struggled to address the eight required components of an information security program, specifically in implementing security controls.

“The loss or unauthorized disclosure or alteration of the information residing on federal systems, which can include PII, can lead to serious consequences and substantial harm to individuals and the nation,” the report reads. “Thus it is critical that federal agencies protect their systems and the information on them and respond to data breaches and cyber incidents when they occur.”

Of the seven agencies evaluated, the Internal Revenue Service was the only one to consistently document both an assigned risk level and how that level was determined for PII-related data breach incidents. Only the Army and IRS documented the number of affected people for each incident.

None of the seven agencies consistently offered credit monitoring to those affected by the incidents, nor did they document lessons learned from their responses to the breach.

The report details key guidelines for agencies to follow from the Office of Management and Budget and the National Institute of Standards and Technology to improve their information security posture.

Among these guidelines are management practices, which include establishing a data breach response team and training employees on roles and responsibilities for breach response. There are also operational practices, such as preparing reports on suspected data breaches and submitting them to appropriate internal and external entities, assessing the likely risk of harm and level of impact of a suspected breach, offering assistance to affected individuals and analyzing the agency’s breach response and identifying lessons learned.

Besides the Army and IRS, the other agencies GAO examined were the Centers for Medicare and Medicaid Services, the Department of Veterans Affairs, the Federal Deposit Insurance Corporation, the Federal Reserve Board, the Federal Retirement Thrift Investment Board and the Securities and Exchange Commission.

About the Author

Mike Cipriano is a GCN editorial intern, and also writes occasionally for FCW. Connect with him on Twitter: @mikecip07.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Fri, Apr 4, 2014 john keese US

I wondered if they reviewed how many agencies had staff utilizing storage services like Dropbox that meet no security standards for protection of data.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group