Have you noticed? The largest U.S. based cybersecurity hacks in recent years have all come up on the “vastly overrated” AT&T Network? Sources close to the investigation say that would just be a matter of fact. Not much satisfaction to the “infected,” but here’s what AT&T says: https://www.csid.com/attcustomercare/
By now you may have heard that China vs. U.S. isn’t working out well for the U.S. Government and announced yesterday that four million (plus) government workers have had their identity stolen: https://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposes-personnel-data.html?_r=0 . This is the third time on the Obama watch that a massive breach has happened and still no word from the White house.
On Feburary 12th of 2015 at https://www.linkedin.com/pulse/china-vs-usa-nation-state-sponsored-attacks-jonathan-goetsch on LinkedIn, the very topic of state sponsored attacks was being disected, analized and brought to the attention of anyyone willing to listen. Unfortunately, it seems that they still have their hands firmly planted over their ears! But, it’s never too late! Just imagine what could be done. Moving from reactive to proactive, offensive and not defensive as was discussed last month (May) in CIO Review Magazine here: https://security.cioreview.com/vendor/2015/US_ProTech. For example, freezing Chineese financial interestes under our control may seem over zealous; however, anything short of that suggests that we all just accept the status-quo and remind ourselves that our once great nation is being run by the most corrupt, spineless and pathetic group of Anti-American Constitutional supporters since the 2nd War. Can you hear me now? (oh, that was a Verizon plug, sorry!)
Let me first say that we as a company are a direct partner of CenturyLink, which means by the nature of this article that if you’re concerned about your network and security, we can provide you a no-cost, no-obligation proposal to replace your AT&T circuits (that’s my 10 second promo). And get this… when working with US ProTech, you actually pay less than if you were to buy direct. So – “Thank You” for reading and for allowing US ProTech the opportunity to earn your business. That said – let’s get to the good stuff!
AT&T’s network looks more and more like Las Vegas style slot machines… only when it comes to US Government networks – they play like the losest slots in town. It seems that everybody has their number and if you’re China and ready to “play the slots” they have a real advantage between lose network architecture, governmental over confidence as we witness security breach after security breach.
Never fear, big brother is here. The following excerpt is taken directly from a US Military communication making it’s rounds today, June 4, 2015. Security Advisory – Information About the Recent Cybersecurity Incident (below) and Necessary action to take if YOU SUSPECT that your information has been compromised (Which it has). Here’s part of the official OPM Memorandun:
The U.S. Office of Personnel Management (OPM) recently became aware of a cybersecurity incident affecting its systems and data that may have compromised the personal information of current and former Federal employees.
Within the last year, OPM has undertaken an aggressive effort to update its cybersecurity posture, adding numerous tools and capabilities to its networks. As a result, in April 2015, OPM became aware of the incident affecting its information technology (IT) systems and data that predated the adoption of these security controls.
Since the incident was identified, OPM has partnered with the U.S. Department of Homeland Security’s U.S. Computer Emergency Readiness Team (US-CERT), and the Federal Bureau of Investigation to determine the impact to Federal personnel. And OPM immediately implemented additional security measures to protect the sensitive information it manages.
Beginning June 8 and continuing through June 19, OPM will be sending notifications to approximately 4 million individuals whose Personally Identifiable Information was potentially compromised in this incident. The email will come from email@example.com and it will contain information regarding credit monitoring and identity theft protection services being provided to those Federal employees impacted by the data breach. In the event OPM does not have an email address for the individual on file, a standard letter will be sent via the U.S. Postal Service.
In order to mitigate the risk of fraud and identity theft, OPM is offering affected individuals….. Please sign up at www.USProTech.com and request the full article to get the remaining 2 pages of information.
Also, see the following links for additional information: