SlideShare a Scribd company logo
1 of 1
Download to read offline
Department of Defense has message on cyber security incident
As you may already be aware, the U.S. Office of Personnel Management (OPM)
recently became aware of a cyber-security incident affecting its systems and data that
may have compromised the Personally Identifiable Information (PII) of current and
former federal employees. Data breaches can be confusing, even scary, and we hope this
message, additional resources and the notification process will help explain this
incident.
As a result of an investigation to determine the impact of this cyber-security incident
to federal personnel, OPM is notifying about four million federal civilians whose PII
may have been compromised. This incident affects current and former federal,
including DoD, personnel. Only contractors who previously held federal civilian
positions were affected, and this incident did not affect military records.
All affected personnel are automatically enrolled in identity theft insurance through
CSID, a company that specializes in identity theft protection and fraud resolution.
Additional credit monitoring services will be provided upon registration. To learn more
about these services, visit www.opm.gov and click on the homepage banner that says
"Important Information about the recent cyber security incident."
OPM began sending out email notifications Monday, June 8 via CSID through a
generic email address (opmcio@csid.com). These initial emails instructed recipients to
click on an embedded link to register for their credit monitoring services. Recognizing
the inherent security concerns in this methodology, DoD, with OPM and CSID support,
has suspended notifications to DoD until an improved, more secure notification and
response process is in place. DoD is working closely with the White House, OPM and
other federal partners to establish notification procedures that will allow DoD
personnel to reliably, confidently receive these notifications and register for the full
benefits to which they are entitled.
If you have received a notification via email from this email account and entered
your PIN, you have registered for these credit monitoring services. If you disregarded
that email or have not yet received it, don't worry - you are automatically enrolled in
the identity theft insurance, and you will receive notice via email or mail sometime
soon.
Many of you have exercised cyber security best practices during the course of this
notification process, and we thank you for your diligence. Moving forward, you will
receive notice through this credit-monitoring registration process via email or mail
sometime soon. If you would like to learn more about this incident or the services in
which you may already be enrolled, please visit www.opm.gov.
Thank you for your patience; the DoD workforce will be kept informed of
notifications pertaining to this incident via email, www.defense.gov and other methods.
See more information about the cyber-security incident at
www.opm.gov/faqs/topic/cybersecurityinformation.

More Related Content

What's hot

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationpaulgundersen9
 
How to get an Arizona Security Guard Card License
How to get an Arizona Security Guard Card LicenseHow to get an Arizona Security Guard Card License
How to get an Arizona Security Guard Card LicenseAlex Haddox, M.Ed.
 
2016 Cyber Presentation
2016 Cyber Presentation2016 Cyber Presentation
2016 Cyber PresentationTodd Rowe
 
Medical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for ConsumersMedical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for Consumers- Mark - Fullbright
 
Pre-employment Criminal Screening By BackgroundChecks.org
Pre-employment Criminal Screening By BackgroundChecks.org
Pre-employment Criminal Screening By BackgroundChecks.org
Pre-employment Criminal Screening By BackgroundChecks.org aspiringlimbo6079
 
New Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit KhandelwalNew Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit Khandelwalamitkhand
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scamsncpd
 
Consent form for TESDA
Consent form for TESDAConsent form for TESDA
Consent form for TESDAGieKo
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policyfarrahesham
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4Max Charles Alperstein
 
Steps For Apply a Fresh Passport in India
Steps For Apply a Fresh Passport in IndiaSteps For Apply a Fresh Passport in India
Steps For Apply a Fresh Passport in IndiaManpreetSingh1374
 
Encyclopedia of Ethical Failure, updated July 2013
Encyclopedia of Ethical Failure, updated July 2013Encyclopedia of Ethical Failure, updated July 2013
Encyclopedia of Ethical Failure, updated July 2013Honolulu Civil Beat
 
FACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASE
FACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASEFACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASE
FACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASEMichael Giffney
 

What's hot (19)

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
300.53 accurint usage
300.53 accurint usage300.53 accurint usage
300.53 accurint usage
 
How to get an Arizona Security Guard Card License
How to get an Arizona Security Guard Card LicenseHow to get an Arizona Security Guard Card License
How to get an Arizona Security Guard Card License
 
2016 Cyber Presentation
2016 Cyber Presentation2016 Cyber Presentation
2016 Cyber Presentation
 
Medical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for ConsumersMedical Identity Theft Response Checklist for Consumers
Medical Identity Theft Response Checklist for Consumers
 
Pre-employment Criminal Screening By BackgroundChecks.org
Pre-employment Criminal Screening By BackgroundChecks.org
Pre-employment Criminal Screening By BackgroundChecks.org
Pre-employment Criminal Screening By BackgroundChecks.org
 
New Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit KhandelwalNew Data Privacy Rules By Amit Khandelwal
New Data Privacy Rules By Amit Khandelwal
 
Privacy Act
Privacy ActPrivacy Act
Privacy Act
 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
 
2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form2021 Chapitre Istanbul Registration Form
2021 Chapitre Istanbul Registration Form
 
Consent form for TESDA
Consent form for TESDAConsent form for TESDA
Consent form for TESDA
 
Taxpayer rights
Taxpayer rightsTaxpayer rights
Taxpayer rights
 
American Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy PolicyAmerican Academy in Al Mizhar - Privacy Policy
American Academy in Al Mizhar - Privacy Policy
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4Employee Benefit Flyer Max Charles Alperstein-4
Employee Benefit Flyer Max Charles Alperstein-4
 
Steps For Apply a Fresh Passport in India
Steps For Apply a Fresh Passport in IndiaSteps For Apply a Fresh Passport in India
Steps For Apply a Fresh Passport in India
 
Official Secrets Act, 1923
Official Secrets Act, 1923Official Secrets Act, 1923
Official Secrets Act, 1923
 
Encyclopedia of Ethical Failure, updated July 2013
Encyclopedia of Ethical Failure, updated July 2013Encyclopedia of Ethical Failure, updated July 2013
Encyclopedia of Ethical Failure, updated July 2013
 
FACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASE
FACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASEFACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASE
FACEBOOK PHOTOS COULD BE ADDED TO AUSTRALIA'S FACIAL VERIFICATION DATABASE
 

Similar to DoD message on OPM cyber security breach affecting millions

Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthemamason04
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for NonprofitsNPowerCR
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachDaniel Michels
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...CBIZ, Inc.
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018Deepanshu Gahlaut
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Data security
Data securityData security
Data securityoco26
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 

Similar to DoD message on OPM cyber security breach affecting millions (20)

Reta email blast anthem
Reta email blast anthemReta email blast anthem
Reta email blast anthem
 
Csd6059
Csd6059Csd6059
Csd6059
 
Do you have an identity theft protection plan
Do you have an identity theft protection planDo you have an identity theft protection plan
Do you have an identity theft protection plan
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Ten Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax BreachTen Protective Steps to Address the Equifax Breach
Ten Protective Steps to Address the Equifax Breach
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 20185 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Data security
Data securityData security
Data security
 
Employee law module
Employee law moduleEmployee law module
Employee law module
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Adrs2
Adrs2Adrs2
Adrs2
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 

More from Joint Base Myer-Henderson Hall

16 21 news release - national memorial day observance at anc
16 21  news release - national memorial day observance at anc16 21  news release - national memorial day observance at anc
16 21 news release - national memorial day observance at ancJoint Base Myer-Henderson Hall
 
Defense Civilian Emerging Leader Program - program overview
Defense Civilian Emerging Leader Program - program overviewDefense Civilian Emerging Leader Program - program overview
Defense Civilian Emerging Leader Program - program overviewJoint Base Myer-Henderson Hall
 
Defense Civilian Emerging Leader Program- application package
Defense Civilian Emerging Leader Program- application packageDefense Civilian Emerging Leader Program- application package
Defense Civilian Emerging Leader Program- application packageJoint Base Myer-Henderson Hall
 
“Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center “Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center Joint Base Myer-Henderson Hall
 
“Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center “Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center Joint Base Myer-Henderson Hall
 

More from Joint Base Myer-Henderson Hall (20)

Chapel
ChapelChapel
Chapel
 
Tgive17
Tgive17Tgive17
Tgive17
 
Acc17
Acc17Acc17
Acc17
 
Acc17
Acc17Acc17
Acc17
 
Fevs
FevsFevs
Fevs
 
FAQ: Lead sampling in Army Family Housing Units
FAQ: Lead sampling in Army Family Housing UnitsFAQ: Lead sampling in Army Family Housing Units
FAQ: Lead sampling in Army Family Housing Units
 
New Gate Hours for JBM-HH
New Gate Hours for JBM-HHNew Gate Hours for JBM-HH
New Gate Hours for JBM-HH
 
Lgbt
LgbtLgbt
Lgbt
 
16 21 news release - national memorial day observance at anc
16 21  news release - national memorial day observance at anc16 21  news release - national memorial day observance at anc
16 21 news release - national memorial day observance at anc
 
Defense Civilian Emerging Leader Program - program overview
Defense Civilian Emerging Leader Program - program overviewDefense Civilian Emerging Leader Program - program overview
Defense Civilian Emerging Leader Program - program overview
 
Defense Civilian Emerging Leader Program- application package
Defense Civilian Emerging Leader Program- application packageDefense Civilian Emerging Leader Program- application package
Defense Civilian Emerging Leader Program- application package
 
2016 JBM-HH Commander's Race Series
2016 JBM-HH Commander's Race Series2016 JBM-HH Commander's Race Series
2016 JBM-HH Commander's Race Series
 
JBM-HH Feb. 25-26 Workforce Town Hall slides
JBM-HH Feb. 25-26 Workforce Town Hall slidesJBM-HH Feb. 25-26 Workforce Town Hall slides
JBM-HH Feb. 25-26 Workforce Town Hall slides
 
RDCond
RDCondRDCond
RDCond
 
“Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center “Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center
 
“Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center “Suspicious odor” investigated at Cody Child Development Center
“Suspicious odor” investigated at Cody Child Development Center
 
JBM-HH ASAP 2016 annual prevention education plan
JBM-HH ASAP 2016 annual prevention education planJBM-HH ASAP 2016 annual prevention education plan
JBM-HH ASAP 2016 annual prevention education plan
 
CIF2016
CIF2016CIF2016
CIF2016
 
Hours15 16
Hours15 16Hours15 16
Hours15 16
 
HHupgrade
HHupgradeHHupgrade
HHupgrade
 

DoD message on OPM cyber security breach affecting millions

  • 1. Department of Defense has message on cyber security incident As you may already be aware, the U.S. Office of Personnel Management (OPM) recently became aware of a cyber-security incident affecting its systems and data that may have compromised the Personally Identifiable Information (PII) of current and former federal employees. Data breaches can be confusing, even scary, and we hope this message, additional resources and the notification process will help explain this incident. As a result of an investigation to determine the impact of this cyber-security incident to federal personnel, OPM is notifying about four million federal civilians whose PII may have been compromised. This incident affects current and former federal, including DoD, personnel. Only contractors who previously held federal civilian positions were affected, and this incident did not affect military records. All affected personnel are automatically enrolled in identity theft insurance through CSID, a company that specializes in identity theft protection and fraud resolution. Additional credit monitoring services will be provided upon registration. To learn more about these services, visit www.opm.gov and click on the homepage banner that says "Important Information about the recent cyber security incident." OPM began sending out email notifications Monday, June 8 via CSID through a generic email address (opmcio@csid.com). These initial emails instructed recipients to click on an embedded link to register for their credit monitoring services. Recognizing the inherent security concerns in this methodology, DoD, with OPM and CSID support, has suspended notifications to DoD until an improved, more secure notification and response process is in place. DoD is working closely with the White House, OPM and other federal partners to establish notification procedures that will allow DoD personnel to reliably, confidently receive these notifications and register for the full benefits to which they are entitled. If you have received a notification via email from this email account and entered your PIN, you have registered for these credit monitoring services. If you disregarded that email or have not yet received it, don't worry - you are automatically enrolled in the identity theft insurance, and you will receive notice via email or mail sometime soon. Many of you have exercised cyber security best practices during the course of this notification process, and we thank you for your diligence. Moving forward, you will receive notice through this credit-monitoring registration process via email or mail sometime soon. If you would like to learn more about this incident or the services in which you may already be enrolled, please visit www.opm.gov. Thank you for your patience; the DoD workforce will be kept informed of notifications pertaining to this incident via email, www.defense.gov and other methods. See more information about the cyber-security incident at www.opm.gov/faqs/topic/cybersecurityinformation.