{"id":1528,"date":"2013-06-12T13:02:38","date_gmt":"2013-06-12T13:02:38","guid":{"rendered":"http:\/\/www.sogolytics.com\/blog\/?p=1528"},"modified":"2020-06-09T08:12:30","modified_gmt":"2020-06-09T12:12:30","slug":"insecurity-clearances","status":"publish","type":"post","link":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/","title":{"rendered":"Insecurity Clearances | Sogolytics"},"content":{"rendered":"<p>Regardless of your political leanings, there\u2019s no denying the <a title=\"NSA whistleblower Edward Snowden\" href=\"http:\/\/www.dailymail.co.uk\/news\/article-2338944\/NSA-whistleblower-Edward-Snowden-approached-Washington-Post-leaks-newspaper-refused-comply-publishing-demands.html\" target=\"_blank\" rel=\"noopener noreferrer\">impact of the stories broken<\/a> by <i>The Guardian<\/i> and <i>The Washington Post <\/i>this past week.<\/p>\n<p>&nbsp;<\/p>\n<p>Edward Snowden, a 29-year-old Booz Allen Hamilton contractor assigned to the NSA (National Security Agency) is responsible for one of the most substantial national security leaks in American history. According to Snowden, the NSA has been collecting cellphone metadata on millions of Americans and using backdoor channels to gather information on foreigners who use Google, Facebook and Apple, among other service providers.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/06\/Insecurity-Clearance-e1591703964750-300x219.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-47948 size-medium alignleft\" title=\"Insecurity Clearance | Sogolytics\" src=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/06\/Insecurity-Clearance-e1591703964750-300x219-300x219.jpg\" alt=\"\" width=\"300\" height=\"219\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/06\/Insecurity-Clearance-e1591703964750-300x219.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/06\/Insecurity-Clearance-e1591703964750-300x219-50x37.jpg 50w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>But many policymakers and security analysts have focused on another aspect of this story: How did a contractor \u2014 who has been employed by his firm for just three months \u2014 have access to such extremely sensitive information? <a title=\"NSA leaks put focus on intelligence apparatuss\" href=\"http:\/\/www.washingtonpost.com\/business\/nsa-leaks-put-focus-on-intelligence-apparatuss-reliance-on-outside-contractors\/2013\/06\/10\/e940c4ba-d20e-11e2-9f1a-1a7cdee20287_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">According to an article in The Washington Post<\/a>, \u201cBy 2011, more than 4.2 million government and contract workers had security clearances, and more than a third of them had top-secret access. But little has been done to beef up the infrastructure needed to ensure that money is well spent and, more important, to protect the reservoirs of secret information the government is gathering to pursue its battle against terrorism.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Technology has made it easier to collaborate, improving workflow and increasing efficiency. But many organizations (including the NSA!) have done an inadequate job of knowing who is accessing sensitive data and for what purpose. Failing to implement the most basic security protocols will leave you open to both internal and external threats.<\/p>\n<p>&nbsp;<\/p>\n<p>The good news: implementing security measures doesn\u2019t have to hinder collaboration.<\/p>\n<p>&nbsp;<\/p>\n<p>With <a title=\"Multi-user-access\" href=\"https:\/\/www.sogolytics.com\/help\/introduction-manage-sub-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">Multiple-Users<\/a>, Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, eliminating risky password sharing, confusion and inefficiency, while maintaining data privacy.<\/p>\n<p>&nbsp;<\/p>\n<p>There will be times when sharing data with people inside and outside of your organization is essential to facilitating workflow. But \u2014 as recent events have demonstrated \u2014 controlling access to sensitive information is the only way to ensure it\u2019s secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regardless of your political leanings, there\u2019s no denying the impact of the stories broken by The Guardian and The Washington Post this past week. &nbsp; Edward Snowden, a 29-year-old Booz Allen Hamilton contractor assigned to the NSA (National Security Agency) is responsible for one of the most substantial national security leaks in American history. According to Snowden, the NSA has been collecting cellphone metadata on millions of Americans and using backdoor channels to gather information on foreigners who use Google, Facebook and Apple, among other service providers. &nbsp; But many policymakers and security analysts have focused on another aspect of this story: How did a contractor \u2014 who has been employed by his firm for just three months \u2014 have access to such extremely sensitive information? According to an article in The Washington Post, \u201cBy 2011, more than 4.2 million government and contract workers had security clearances, and more than a third of them had top-secret access. But little has been done to beef up the infrastructure needed to ensure that money is well spent and, more important, to protect the reservoirs of secret information the government is gathering to pursue its battle against terrorism.\u201d &nbsp; Technology has made it easier to collaborate, improving workflow and increasing efficiency. But many organizations (including the NSA!) have done an inadequate job of knowing who is accessing sensitive data and for what purpose. Failing to implement the most basic security protocols will leave you open to both internal and external threats. &nbsp; The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5052,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[205],"tags":[128,60,112,300],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Insecurity Clearance | Sogolytics<\/title>\n<meta name=\"description\" content=\"Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, thereby maintaining data privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insecurity Clearance | Sogolytics\" \/>\n<meta property=\"og:description\" content=\"Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, thereby maintaining data privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/\" \/>\n<meta property=\"og:site_name\" content=\"Sogolytics Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-12T13:02:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-09T12:12:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/ff-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"487\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sogolytics\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/\",\"name\":\"Insecurity Clearance | Sogolytics\",\"isPartOf\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\"},\"datePublished\":\"2013-06-12T13:02:38+00:00\",\"dateModified\":\"2020-06-09T12:12:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1\"},\"description\":\"Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, thereby maintaining data privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Insecurity Clearances | Sogolytics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/\",\"name\":\"Sogolytics Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1\",\"name\":\"Sogolytics\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/author\/sogosurvey\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insecurity Clearance | Sogolytics","description":"Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, thereby maintaining data privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/","og_locale":"en_US","og_type":"article","og_title":"Insecurity Clearance | Sogolytics","og_description":"Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, thereby maintaining data privacy.","og_url":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/","og_site_name":"Sogolytics Blog","article_published_time":"2013-06-12T13:02:38+00:00","article_modified_time":"2020-06-09T12:12:30+00:00","og_image":[{"width":487,"height":714,"url":"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2018\/12\/ff-1.png","type":"image\/png"}],"author":"Sogolytics","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/","url":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/","name":"Insecurity Clearance | Sogolytics","isPartOf":{"@id":"https:\/\/www.sogolytics.com\/blog\/#website"},"datePublished":"2013-06-12T13:02:38+00:00","dateModified":"2020-06-09T12:12:30+00:00","author":{"@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1"},"description":"Sogolytics allows account administrators to create and manage sub-accounts and determine permission levels, thereby maintaining data privacy.","breadcrumb":{"@id":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sogolytics.com\/blog\/insecurity-clearances\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Insecurity Clearances | Sogolytics"}]},{"@type":"WebSite","@id":"https:\/\/www.sogolytics.com\/blog\/#website","url":"https:\/\/www.sogolytics.com\/blog\/","name":"Sogolytics Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1","name":"Sogolytics","url":"https:\/\/www.sogolytics.com\/blog\/author\/sogosurvey\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/1528"}],"collection":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/comments?post=1528"}],"version-history":[{"count":17,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/1528\/revisions"}],"predecessor-version":[{"id":47949,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/1528\/revisions\/47949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media\/5052"}],"wp:attachment":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media?parent=1528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/categories?post=1528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/tags?post=1528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}