Securing Identity Does Not
Stop with Strong Authentication
Hackers have utilized stolen identities and improper access to conduct major government hacks and data theft in the last year. The OPM breach, which led to the theft of over 20 million U.S. government personnel records, resulted from a stolen contractor credential and malicious movement up the access chain. Poor identity and access strategies for employees, administrators, and contractors have made securing government institutions even more difficult.