Protecting key information

“Hacker Allegedly Tried to Sell Drone Data,” The Wall Street Journal, July 12, 2018 A3.  Hacker tries to sell maintenance documents for a drone, documents stolen from a Air Force officer’s computer.

How well does the government protect sensitive information?  Apparently, the hack exploited the failure to properly configure a router.

What happened to the Air Force officer, who apparently failed to adequately protect classified information?  The IT guy who configured the router?

Leave a comment

Filed under Access, Compliance, Compliance (General), Controls, Duty, Duty of Care, Governance, Government, Information, Internal controls, IT, Policy, Protect assets, Security

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s