Today, naked celebs. Tomorrow, contractors?

Let’s face it: As trusted and credentialed government contractors that handle demanding cybersecurity, data centers, personal devices at work and cloud computing, most of us feel that our level of competence and sophistication is much higher than most Hollywood celebrities like Jennifer Lawrence, Rhianna, and Kate Upton using the iCloud.

But is it really so?

Can we say, as a community of practice, that the cloud is 100 percent secure (public, private or hybrid) by simply relying on universally accepted encryption protocols?

In my opinion, the answer is No. As government contractors, we are guardians of much more than personal photos and ergo our need to be vigilant as big data and cloud become consumerized.

In fact, I strongly believe that without aligning organizational behavior, user behavior, business processes and the application of proper information security protocols, we should not be surprised if a major government contractor or government agency cloud will fall victim to a Hollywood-type hacker attack.

It may not be cyber terrorism, but it may just be incompetence.

Let’s use some common sense and take advantage of the cloud, but make sure we follow the golden rules, which apply to our data centers and enterprise IT.


With the phenomenon of bring your own device (BYOD), you should treat your device like your house. You don’t invite in strangers, you always lock your doors and windows at night.

Your device is tied to you, protect it like you protect yourself

On any device where you consume sensitive or company related data or email:

  • Add a passcode lock to your device if email is resident on it.
  • Disable automatic cloud backup applications
  • Update your devices often to keep up with security updates
  • Never store passwords, enter it every time you connect to a service

Do not open unfamiliar emails and do not click unknown links and avoid connecting to unknown or unsecured wireless networks.


You wouldn’t tell a stranger your home address. Treat the networks you connect to as either friends or strangers and trust accordingly.

For any apps, sites, or services, use two-factor authentication, two-step verification, SSL or VPN whenever possible


  • Minimize the use of Wireless. Turn off Wi-Fi and Bluetooth when not in use.
  • Avoid connecting to unknown or unsecured wireless networks. Turn off automatically connections to networks.


For any questions use alternate information if you can remember it. E.g. if you know that your first car was a Ford Explorer, but you know you actually wanted a Chevy Trailblazer, use that as your answer.

With passwords:

  • Use strong passwords and don't reuse them.
  • Do not use any popular or simple passwords.
  • Do not use the same password for different accounts.
  • Change your passwords every 6 months.

For security questions and answers:

  • Make sure answers are strong and not easily guessable
  • Do not use info that can be identified through social media or research

About the Author

Tony Crescenzo is the CEO of IntelliDyne LLC.

Reader Comments

Fri, Sep 5, 2014 Jenna Martinos Mclean, VA

Tony Crescenzo is right. Too often, we think of the Cloud as secure by default. It isn't. Good tips on good house keeping and reminder for all of us to stay vigilant.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here


  • POWER TRAINING: How to engage your customers

    Don't miss our Aug. 2 Washington Technology Power Training session on Mastering Stakeholder Engagement, where you'll learned the critical skills you need to more fully connect with your customers and win more business. Read More


    In our latest Project 38 Podcast, editor Nick Wakeman interviews Tom Romeo, the leader of Maximus Federal about how it has zoomed up the 2019 Top 100. Read More

contracts DB

Washington Technology Daily

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.