Home / News / FDIC Plans New Security Measures After Retroactive Data Breach Report

FDIC Plans New Security Measures After Retroactive Data Breach Report

SecurityLockThe Federal Deposit Insurance Corp. has suffered five data breach incidents of at least 10,000 records since October and plans to introduce new measures to step up network security at the agency, the Washington Post reported Monday.

Joe Davidson writes a retroactive report to lawmakers cited breaches into taxpayers’ personal information after employees with access to the data left FDIC.

An FDIC employee inadvertently downloaded the data of 44,000 customers prior to departure from the agency, according to an April report by the Post.

FDIC has submitted to Congress a document that outlines security practices the agency plans to adopt over the use of encryption in portable devices, end-to-end evaluation of internal information technology programs, mitigation efforts for future program gaps and the use of software to locate misplaced data, Davidson reports.

Federal News Radio reported Monday the agency also plans to revise its mobile device usage policies for employees, form a new incident tracking system, establish an incident response coordinator role, track printed materials in high-risk areas, create a chief information office and overhaul both reporting and incident escalation procedures.

Check Also

GSA Implementing Robotic Process Automation in Federal Gov’t via Community of Practice

The General Services Administration is establishing a community of practice to enable federal government officials to share ideas and explore opportunities to advance the implementation of robotic process automation. GSA said Friday that Ed Burrows of the agency’s office of the chief financial officer will chair the RPA CoP, which will outline the best practices and determine technical options to realize the benefits of RPA and transition the federal workforce to high-value work in support of a cross-agency priority goal in the President’s Management Agenda.

Leave a Reply

Your email address will not be published. Required fields are marked *