Use (or Misuse) of IT Systems - What Clearance Applicants and Holders Should Know


Originally published at:

The Cold War days of spies using microfilms, dead drops, and disappearing ink are long gone. Now they use cell phones, laptop computers, and remotely injected malware to steal information. As evidenced by stories about hackers and IT security breaches in the news every day, IT technology is a major concern when it comes to…