Major news sources reported in mid-2015 that 21.5 million people were affected by a breach of U.S. government systems. Identity data gathered over the last 15 years was compromised, including personal information about individuals who were part of government employee background checks.
Unfortunately, even the best risk-based, multi-layered breach defense is imperfect, and incidents like this are inevitable. For this reason, there must be a greater focus on controlling what happens after the breach, including ensuring that stolen identities are unusable by anyone but their legitimate owners.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | HID Global |
Published: | March 29, 2023 |
License: | Copyrighted |
Copyright: | © 2015 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, Seos, Lumidigm and Secure Identity Object are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners |