Evidence Solutions, Inc., (ESI) is a premier forensics company founded in 1982.

ESI Provides Elite experts in:

Digital and Electronic Evidence, Computer Forensics, Cell Phone Forensics
Trucking, Truck Accident Investigation and Trucking Regulations, Truck Safety Consulting, Heavy Vehicles & Hazardous Materials
Sports and Fitness, Fitness Facility Standard of Care
Real Estate & Land, Real Estate Syndication
Bankruptcy and Corporate Governance
Accident Reconstruction

Call for a free consultation: 866-795-7166





Computer Data Breach Expert:
Dangerous Social Engineering Part of
Office of Personnel Management Breach!

Social Engineering Can Be Very Dangerous!

Computer Evidence Forensics Expert / Computer Forensics Articles

By Scott Greene

Earlier this year it was discovered that the Office of Personnel Management’s (OPM) system had been breached, and that several millions records were accessed during this time. At this time, it is unclear actually how many records were compromised, only that the number is in the millions.

Data Breach Expert - Data Privacy Expert

Office of Personnel Management Data Breach & Social Engineering

In recent testimony, the OPM Director Katherine Archuleta stated that she knew there were problems regarding system security when she became director on May 23, 2013. When asked why these issues were not addressed and records were not encrypted, she said that “implementing encryption on systems as old as theirs was not feasible”, and a cybersecurity expert testified saying that “encryption would not have helped in this case, as the hackers used valid credentials most likely obtained by social engineering”.

The issue of not securing their systems aside (which is still a valid argument and an important step to take), the issue of social engineering again shows that unfortunately the human element was the downfall in this instance. Somehow, somewhere, at some point, someone let their guard down and inadvertently gave the hacker(s) access to their system. This is one of the most common ways to infiltrate a business, not by bypassing a firewall or tricking an anti-virus program, but by a very intelligent person manipulating a password out of someone without their knowledge.

It is difficult to combat social engineering, as it can take many forms and will often not be the same con twice. The most important thing to remember is not to divulge any information to anyone unless you know that you are giving it to the right person for the right reasons. Slip-ups will happen, but a little training for employees can go a long way in securing your system.

Please: Share this article and the articles listed below to help education your employees and associates.

Have questions about Computer Data Breach Forensics?

Contact us!

We are experts in Data Breach Forensics. Call us today for a FREE consultation: 866-795-7166

By Scott Greene

Evidence Solutions, Inc.

Complex Electronic Evidence in PLAIN English.

Call us today with your Car Evidence Questions: 866-795-7166 or This email address is being protected from spambots. You need JavaScript enabled to view it.


Related Forensics Expert Articles and Pages.

Social Engineering Expert: GoDaddy Social Engineering Attack

Social Engineering Expert: YOU are the Hacker’s Greatest Tool

An Article from our Trucking Experts:

Truck Driver Qualification Expert: FMCSA Drug Testing 50%

Complex Electronic Evidence in PLAIN English.

Like Evidence Solutions - Computer Forensics Experts on Facebook

Follow Evidence Solutions - Electronic Evidence Investigation Expert Division on LinkedIn

Circle Evidence Solutions - Digital Evidence Investigation Experts on Google+

Google+ Author

Google+ Publisher