DHS gets past phishing but leaves docs exposed

An independent audit found that DHS employees were tight-lipped with their passwords but sometimes left sensitive documents in plain sight.

Shutterstock image (by Pavel Ignatov): Alert icon.

The Department of Homeland Security's Office of Inspector General publicly released a report on May 16 that states DHS employees did not budge when asked to give up password information to a friendly caller, but a few of them did leave sensitive documents out on desks and other areas in offices.

The IG contracted with KPMG in late 2015 to conduct an information security test on the agency's Office of Financial Management (OFM) and Office of the CIO. The audit took stock of nontechnical areas related to the protection of sensitive IT and financial information and assets.

On May 6, the IG sent a final version of the audit to DHS CIO Luke McCormack and Chip Fulghum, deputy undersecretary for management and chief financial officer at DHS.

As part of the audit, KPMG representatives called OFM employees on the telephone posing as DHS IT specialists to see if they could wheedle out password information, a technique called "social engineering" in cyber parlance. They called 28 employees and contractors and reached eight of them.

"Of the 8 individuals with whom we spoke, none divulged passwords in violation of DHS policy," the report states. KPMG noted, however, that the calling sample should not be used to extrapolate to OFM as a whole.

The firm's representatives also visited OFM and CIO facilities to take stock of how physical documents were protected, and their findings were less stellar. During after-hours walkthroughs at OFM, auditors inspected 68 workspaces and found six that had material -- including information marked "for official use only" -- left unattended and unsecured in violation of DHS policy. The FOUO designation is used for controlled, unclassified information.

NEXT STORY: Air Force HR is hiring a CIO