
MathCraft Newsletter Issue Q2 2019 – Associate Member of NCMS
Beware the Enemy Within
A media focus on hackers, advanced persistent threats (APTs) and foreign intruders gives the impression that organizations are most endangered by outside actors. In reality, 75% of security breaches occur because of insiders. Most of the time, they aren’t malicious: training users to follow simple protocols can stop a significant number of incidents.

The Security Clearance Process Is About to Get Its Biggest Overhaul in 50 Years – Trusted Workforce 2.0 framework promises to reduce the overwhelming investigation backlog Read More
How the security clearance backlog hurts cybersecurity – clearance delays cause unacceptable delays throughout the government Read More
ODNI, OPM unveil new personnel vetting framework to guide revamped background investigations – Federal agencies express optimism over the latest clearance framework Read More
How Long Does It Take to Process a Security Clearance? Q1 2019 Update – processing time for top secret clearance holds steady at 468 days, but new initiatives have reduced the backlog by 25% Read More
Do people with malicious intent present the biggest threat to personal data? – organizations overwhelmingly attribute insider threats to malicious intent and underestimate the risk of mere user error Read More

How will the clearance overhaul change things?
After a year of development, the Office of the Director of National Intelligence (ODNI) has made it clear that Trusted Workforce 2.0 will soon be deployed, changing the clearance process from top to bottom. In conjunction with recent Continuous Evaluation (CE) requirements, the new system stands to expedite clearances while also placing stricter requirements on clearance holders and agencies.
Among other changes, the clearance process will now be divided among five “vetting scenarios” depending on mission needs and an applicant’s past history. Additionally, investigative tiers have been reduced to three: public trust, secret and top secret.
What does this mean for FSOs? – One thing hasn’t changed, and that’s the importance of accurate and thorough reporting. Personnel seeking clearance should be guided early on to provide honest and up-to-date information; discrepancies will continue to impede the speed of an investigation.

Expedite Background Checks with SF-86 Review
The Office of Personnel Management (OPM) provides Standard Form 86 (SF-86) as a preliminary data-gathering tool for potential cleared individuals. The SF-86 is straightforward, but also demanding; simple errors can lengthen review time and cast needless suspicion on an applicant’s intent.
Review information required by OPM and provide a copy of SF-86 to employees ahead of filing to ensure accuracy and speed of processing.
For more information, check the following resources:


MathCraft Security Technologies, Inc. is the leading provider of innovative software and technologies for Industrial Security professionals. Our tools are compliant with 32 CFR Part 117, NISPOM Rule and are available on-premises or in the cloud. Contact us today to see how our products can transform your security operations!
NCMS Endorsement/Disclaimer: References to commercial products, processes, or services do not necessarily constitute an endorsement by NCMS Inc. The opinions and views expressed on this email and on any linked web sites do not necessarily reflect those of NCMS.

© 2022 MathCraft Security Technologies, Inc. All Rights Reserved.
44121 Harry Byrd Highway, Suite 200, Ashburn, Virginia 20147
703-729-9022, info@mathcraft.com
Quick Links
MathCraft offers the most comprehensive industrial security software in the industry. Our products are compliant with 32 CFR Part 117, NISPOM Rule, and are available on-premise or in the cloud!