PROOF: YOU CANNOT TRUST INFRASTRUCTURE EMPLOYEES WITH KEYS TO THE DIGITAL KINGDOM
In today’s digital-first world, data security is more critical than ever. As businesses increasingly rely on technology, employees with access to sensitive information—especially non-public customer data—hold the keys to your digital kingdom.
But with evolving security threats and changing business landscapes, it’s essential to revisit who has access to your most valuable assets periodically.
Ex-Verizon Engineer Gets 4-Year Prison Sentence for Spying on Falun Gong, Other Chinese Dissidents
A Florida engineer was given a four-year prison term for helping the Chinese regime collect intelligence on Chinese dissidents, such as practitioners of the persecuted faith Falun Gong.
The man, Li Ping, is a naturalized U.S. citizen who had worked for Verizon for 30 years. He had acted on behalf of a Chinese intelligence official in the United States for more than a decade, according to court filings.
Li, who turns 60 in December, passed a wide variety of information on to the ministry of state security, China’s top spying agency, including cybersecurity training materials taken from his tech corporate employer. Repeatedly, he fed the ministry details about pro-democracy advocates living in the United States and Falun Gong practitioners, a major target of the Chinese Communist Party over the past 25 years.
In addition to the prison sentence, U.S. District Judge Steven Merryday also granted prosecutors’ request for a $250,000 fine and three years of supervised release. <Source>
Re-vetting employees who handle confidential information is no longer just a best practice; it’s a necessity. The reality is that threats can come from anywhere—a disgruntled employee, an accidental data leak, or an external cyberattack. Ensuring that those who still require access are appropriately vetted and those who no longer need access have their privileges revoked is critical to mitigating risks.
Re-vetting doesn’t just mean a one-time background check. It involves reviewing roles, updating permissions, and ensuring proper security protocols are in place. Regular audits, awareness training, and tight access controls can prevent potential breaches and help build a security culture across your organization.
It’s time to strengthen your defenses. Ensure that only trusted individuals have the keys to your digital kingdom. Protect your business, customers, and reputation today by implementing a comprehensive re-vetting strategy.
Trading convenience for security.
When we trade convenience for security, we compromise our long-term safety and well-being for short-term ease. It’s easy to give in to the allure of convenience, but in doing so, we often overlook the vulnerabilities it creates. Convenience encourages automation, reducing our awareness and control over potential risks. Security, however, requires attention, diligence, and often inconvenience. As we grow accustomed to systems that promise ease—whether through technology, surveillance, or centralized services—we unknowingly surrender our privacy, autonomy, and sometimes, even our freedom. The trade-off, while tempting, often leaves us exposed in ways we might not fully comprehend until it’s too late.
Bottom line...
Perhaps the most significant incentive for governments and non-governmental organizations to improve security is to allow customers to rescind arbitration clauses and damage limits in cases of cybersecurity failures and recover actual damages.
We are so screwed when we trade convenience for security.
--Steve
“Nullius in verba”-- take nobody's word for it!
"Acta non verba" -- actions not words
“Beware of false knowledge; it is more dangerous than ignorance.”-- George Bernard Shaw
“Progressive, liberal, Socialist, Marxist, Democratic Socialist -- they are all COMMUNISTS.”
“The key to fighting the craziness of the progressives is to hold them responsible for their actions, not their intentions.” – OCS "The object in life is not to be on the side of the majority, but to escape finding oneself in the ranks of the insane." -- Marcus Aurelius “A people that elect corrupt politicians, imposters, thieves, and traitors are not victims... but accomplices” -- George Orwell “Fere libenter homines id quod volunt credunt." (The people gladly believe what they wish to.) ~Julius Caesar “Describing the problem is quite different from knowing the solution. Except in politics." ~ OCS