Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

When leaders ignore cybersecurity rules, the whole system weakens | Computer Weekly

By Computer Weekly by By Computer Weekly
May 27, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Weeks after the ‘Signalgate‘ scandal broke, the problems exposed by White House officials using non-government encrypted messaging services are much larger than one app or one official. It is critical for leaders of any operation, public or private sector, to apply best security practices continuously.

No public statement has been made about improving security protocols. Instead, the public can see that leaders will not be held accountable.

A continuous series of mistakes means no process

US National Security Advisor Mike Waltz made the first mistake of adding the journalist who had no need to know what was being discussed in the unsecured Signal chat. 

US Secretary of Defense Pete Hegseth made the second mistake of posting classified information without obtaining verification the journalist was authorised and had a need to know the classified information. 

Everyone else in the chat, including Cabinet-level officials such as Vice President JD Vance, made the third and continued mistakes of doing nothing until after the initial story broke. 

The US and its allies may just be lucky that their adversaries were not able to compromise the US military plans that week, but what was compromised was the trust American allies have with their national security counterparts.

This isn’t some random political embarrassment. It’s a case study in how security collapses when leadership treats basic rules as optional. If national security leaders won’t model discipline, how can anyone else in the system be expected to?

Processes and tools are not enough

As a Certified Information Systems Security Professional (CISSP) and COO supporting information security for multiple businesses, I’ve seen firsthand that encryption and published policies aren’t enough.

The Waltz-Hegseth leak, which is an affront to the entire security profession, didn’t happen because of poor technology. Signal is excellent when it is used properly. Secure communications platforms, like Sensitive Compartmented Information Facilities (SCIFs), already exist inside the government. So how did this scandal happen? Secure practices rely on culture. And culture is set at the top. Waltz, Hegseth, and others prioritised convenience over responsibility. They believed the rules were there for other people.

The same risks exist in the private sector. In finance, healthcare, and defense industries, one executive ignoring protocol can compromise an entire organisation, especially if others believe protocol is optional.

Continuous security culture is an imperative

The lessons from the Signal scandal are clear:

•    Use secure, authorised tools that go through continuous assessments conducted by trusted third-party security specialists.

•    Never share classified information outside vetted networks, and ensure only those with a need to know are able to see such information.

•    Escalate violations and apply breach consequences equally with no exceptions for title or rank.

•    Work with and support leadership to implement security best practices across all operations, not only obvious revenue drivers.

•    Train leaders and contributors alike to prioritise cybersecurity and refresh learnings continuously, not treat it as compliance paperwork.

Failures at the top don’t stay isolated. They erode standards across institutions and signal to adversaries that they can pursue organisations lacking the maturity required to deal with sensitive information. We’re entering a new paradigm where the threats will become fully automated and using AI, able to leverage social engineering attacks at a massive scale with little effort.

Security starts with leadership, not technology. When rules become optional for those in charge, the system is already compromised.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

Recommended.

Rewst Empowers MSPs To Build, Customize And Scale Automation For Clients

Rewst Empowers MSPs To Build, Customize And Scale Automation For Clients

October 1, 2025
FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

August 20, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio