systems couldn t boot up. what can we do about this? i think you hinted at it in your question. you can t solve these things in 24 hours. this is why a cyber community goes on and on about good cyber hygiene, good cyber security. so onto the solutions. it probably is a bit too late. but we re talking here about identifying and protecting critical efforts, segmenting your i.t. from your technologies. there s technology which actually helps operate the system and i.t. behind it. you need to split those, patch regularly, have good incident response protocols, understand the threat. and what you just said there, move off-line, you know, some things do need to be done off-line. i m not saying this means pen or paper, but, you know, you have to have some systems that are air gapped so they can t be accessed in this way. yeah, a lot of those warnings
When reading about cyber-security, you’ll probably see talk about “air-gapped” computer systems. It’s a technical name for a simple concept: A computer system that’s physically isolated from potentially dangerous networks. Or, in simpler terms, using a computer offline.
classifications are right. the argument is impeccable. to me, brooke, it looks like a bill of indictment aired by several people but that s speculation. and when you look at, it s this this classified adendics headendics appendix and they right about, i m curious. i ve been out of the situation rook dealing with these situations and it was placed into a computer system managed directly by the national security council direct for intelligence programs a stand-alone computer system reserved for code word-level intelligence? can you talk a little about that and why this would be put in there? well, it s for compartmented information. ness no reason to put it in there other than there s look at the conversation that trump had with zelensky. there s nothing in there classified. nothing. zero. to naught into that computer system, stand-alone, air-gapped,