
{"id":2269,"date":"2013-02-11T00:00:00","date_gmt":"2013-02-11T00:00:00","guid":{"rendered":"http:\/\/otava.test\/federal-breaches-highlight-need-for-heightened-it-security\/"},"modified":"2013-02-11T00:00:00","modified_gmt":"2013-02-11T00:00:00","slug":"federal-breaches-highlight-need-for-heightened-it-security","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/","title":{"rendered":"Federal Breaches Highlight Need for Heightened IT Security"},"content":{"rendered":"<p>Last month, the U.S. Department of Energy had <a href=\"https:\/\/bits.blogs.nytimes.com\/2013\/02\/04\/energy-department-is-the-latest-victim-of-an-online-attack\/\">its computer systems hacked<\/a>. Last Friday, an email was sent to all the employees explaining that their Washington location had been compromised, making off with the personal information of employees and contractors. The DOE, who maintains control of important functions such as nuclear reactor production, energy conservation research and implementation, energy production, and radioactive waste disposal, says that none of the information taken was confidential. In an email to its employees, the DOE explained that it was taking steps to keep this from happening again in the future:<\/p>\n<p>\u2018The Department is also leading an aggressive effort to reduce the likelihood of these events occurring again. These efforts include leveraging the combined expertise and capabilities of the Department\u2019s Joint Cybersecurity Coordination Center to address this incident, increasing monitoring across all of the Department\u2019s networks and deploying specialized defense tools to protect sensitive assets.\u2019<\/p>\n<p>Similarly, this week the Federal Reserve admitted that it had <a href=\"https:\/\/www.reuters.com\/article\/2013\/02\/06\/net-us-usa-fed-hackers-idUSBRE91501920130206?feedType=RSS&amp;feedName=technologyNews&amp;utm_source=dlvr.it&amp;utm_medium=twitter&amp;dlvrit=56505\">one of its internal sites breached<\/a>. Coupled with this attack is a claim by the activist group Anonymous that they had attacked the Fed, and had the personal information of over 4,000 bank executives to prove it. The Federal Reserve stated that the compromise did not adversely affect any functions that were critical to the bank system running as normal. The posted information included addresses, business and mobile numbers, as well as business emails. The Fed said that there were no passwords leaked. The Fed explained in their email that they plan to prevent future attacks with the increase in <a href=\"https:\/\/onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">network monitoring<\/a> to complement the implementation of other cyber defense strategies.<\/p>\n<p>At the end of a week of these pretty high profile breaches (not to mention the New York Times, <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/twitter-attacked-250k-potentially-affected\/\">Twitter<\/a>, and the Wall Street Journal), now seems like a great time to evaluate the <a href=\"https:\/\/onlinetech.com\/secure-hosting\/technical-security\">technical<\/a>, <a href=\"https:\/\/onlinetech.com\/secure-hosting\/physical-security\">physical<\/a>, and <a href=\"https:\/\/onlinetech.com\/secure-hosting\/administrative-security\">administrative<\/a> security measures in place within your own company. Having safeguards like <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">vulnerability scanning<\/a>, a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">web application firewall<\/a> (WAF), or<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"> two-factor authentication<\/a> put extra layers of protection between a potential breach and your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, the U.S. Department of Energy had its computer systems hacked. Last Friday, an email was sent to all the employees explaining that their Washington location had been compromised, making off with the personal information of employees and contractors. The DOE, who maintains control of important functions such as nuclear reactor production, energy conservation research and implementation, energy production, and radioactive waste disposal, says that none of the information taken was confidential. In an email to its employees, the DOE explained that it was taking steps to keep this from happening again in the future: \u2018The Department is also leading an aggressive effort to reduce the likelihood of these events occurring again. These efforts include leveraging the combined expertise and capabilities of the Department\u2019s Joint Cybersecurity Coordination Center to address this incident, increasing monitoring across all of the Department\u2019s networks and deploying specialized defense tools to protect sensitive assets.\u2019 Similarly, this week the Federal Reserve admitted that it had one of its internal sites breached. Coupled with this attack is a claim by the activist group Anonymous that they had attacked the Fed, and had the personal information of over 4,000 bank executives to prove it. The Federal Reserve&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2269","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Federal Breaches Highlight Need for Heightened IT Security | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal Breaches Highlight Need for Heightened IT Security\" \/>\n<meta property=\"og:description\" content=\"Last month, the U.S. Department of Energy had its computer systems hacked. Last Friday, an email was sent to all the employees explaining that their Washington location had been compromised, making off with the personal information of employees and contractors. The DOE, who maintains control of important functions such as nuclear reactor production, energy conservation research and implementation, energy production, and radioactive waste disposal, says that none of the information taken was confidential. In an email to its employees, the DOE explained that it was taking steps to keep this from happening again in the future: \u2018The Department is also leading an aggressive effort to reduce the likelihood of these events occurring again. These efforts include leveraging the combined expertise and capabilities of the Department\u2019s Joint Cybersecurity Coordination Center to address this incident, increasing monitoring across all of the Department\u2019s networks and deploying specialized defense tools to protect sensitive assets.\u2019 Similarly, this week the Federal Reserve admitted that it had one of its internal sites breached. Coupled with this attack is a claim by the activist group Anonymous that they had attacked the Fed, and had the personal information of over 4,000 bank executives to prove it. The Federal Reserve...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-11T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Federal Breaches Highlight Need for Heightened IT Security\",\"datePublished\":\"2013-02-11T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\"},\"wordCount\":352,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\",\"url\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\",\"name\":\"Federal Breaches Highlight Need for Heightened IT Security | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-02-11T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Federal Breaches Highlight Need for Heightened IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Federal Breaches Highlight Need for Heightened IT Security | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Federal Breaches Highlight Need for Heightened IT Security","og_description":"Last month, the U.S. Department of Energy had its computer systems hacked. Last Friday, an email was sent to all the employees explaining that their Washington location had been compromised, making off with the personal information of employees and contractors. The DOE, who maintains control of important functions such as nuclear reactor production, energy conservation research and implementation, energy production, and radioactive waste disposal, says that none of the information taken was confidential. In an email to its employees, the DOE explained that it was taking steps to keep this from happening again in the future: \u2018The Department is also leading an aggressive effort to reduce the likelihood of these events occurring again. These efforts include leveraging the combined expertise and capabilities of the Department\u2019s Joint Cybersecurity Coordination Center to address this incident, increasing monitoring across all of the Department\u2019s networks and deploying specialized defense tools to protect sensitive assets.\u2019 Similarly, this week the Federal Reserve admitted that it had one of its internal sites breached. Coupled with this attack is a claim by the activist group Anonymous that they had attacked the Fed, and had the personal information of over 4,000 bank executives to prove it. The Federal Reserve...","og_url":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/","og_site_name":"OTAVA","article_published_time":"2013-02-11T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Federal Breaches Highlight Need for Heightened IT Security","datePublished":"2013-02-11T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/"},"wordCount":352,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/","url":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/","name":"Federal Breaches Highlight Need for Heightened IT Security | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-02-11T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/federal-breaches-highlight-need-for-heightened-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Federal Breaches Highlight Need for Heightened IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2269"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2269\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2269"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}