A June 22 memo from the Defense Department director of intelligence, law enforcement and security is reminding employees about their responsibility to protect nonpublic information (A DLA Common Access Card is required to view the memo).
Recent high-profile security breaches to fuel infrastructure and near-record levels of phishing attempts indicate increased attempts to gain access to sensitive, protected information, DLA Operations Security Program Manager Erica Quinley said.
“DLA employees must be vigilant and on high alert at all times, taking proactive measures to protect sensitive information, physically and digitally, as well as recognizing and reporting suspicious behavior and collection attempts,” she said.
DLA Information Security Program Manager Matthew Baker concurred.
“Cyberattacks highlight the importance of properly protecting our digital data. DLA employees can do their part by only using approved government systems to transmit official information,” he said.
According to the memo, DOD employees must avoid using nongovernment websites or applications such as those without a “.mil” or “.gov” extension when posting or uploading information. Employees can post controlled unclassified information only to government or approved contractor websites that use encrypted transmission and require certificate-based or password and ID access. Employees should likewise avoid verbal discussions involving nonpublic information on unprotected sites or applications.
In a video message to the workforce, DLA Director Navy Vice Adm. Michelle Skubic explains the challenges the agency’s cybersecurity team faces daily.
"On any given day, the DLA network is subject to countless cyberattacks with the intent to disrupt operations and cause harm to the warfighter, our industry partners and our nation," she said.