
A malware-laced e-mail that spoofed seasons greetings from The White House siphoned gigabytes of sensitive documents from dozens of victims over the holidays, including a number of government employees and contractors who work on cybersecurity matters.
All you need to do is just not open junk from untrusted sources and then verify that a person actually sent you something when you get something odd from a trusted source.
Block access to malicious .
Monitor and prioritize access to web/ftp (download/upload)
Encrypt sensitive documents
Block executable file downloads (.exe / .bin)
Ban all smartphones/cameras.
That should be in place before an employee decided to download a Christmas card off a Russian web site routed through a Chinese server.
These measures would be if anything for the workers benefit. The employer should be a nanny but they should be letting sensitive documents be handled with no protocol at all either. That just asking it to be leaked.
Every 'secure' system I've ever dealt with was on a completely segregated network. No email. No Internet. No USB ports. No CD burners. The really sensitive stuff was on paper in file cabinets, in a big concrete room that only has controlled physical access through a man-trap, controlled by a person in a cage.
Hate to say, but it's easier to defeat the person in the cage then it is the computer that doesn't care who you say you are.
I'm fairly certain though, putting all treason aside, that Manning still deserved some time in the slammer just for even buying a Lady GaGa CD in the first place.
Every 'secure' system I've ever dealt with was on a completely segregated network. No email. No Internet. No USB ports. No CD burners. The really sensitive stuff was on paper in file cabinets, in a big concrete room that only has controlled physical access through a man-trap, controlled by a person in a cage.
Hate to say, but it's easier to defeat the person in the cage then it is the computer that doesn't care who you say you are.
Quite so. But that's why he's the last line of defense to get into the secured archive, not the first. A person has to go through many card reader controlled doors to get to the secure archive, and needs several forms of authentication to get through the man trap.
Some places take research information and security quite seriously.