

“This can be spelled out in both new hire onboarding documents as well as communications with current employees, so everyone understands what is considered standard of care. To decrypt the LastPass Vault, you would need 3 main ingredients: With a MITM, we can steal the victim’s username and password, and once the session is trusted after OTP from the YubiKey, we can download the encrypted vault. “Importantly, companies should create incentives for managing information properly and also consider penalties or corrections for intentional or negligent use of information, including passwords and company accounts,” he continues. “First and foremost, companies should make it 100 percent clear to their employees what the standards of care and conduct are, including what is authorized and unauthorized handling of intellectual property and proprietary information,” says Daniel Farber Huang, Head of Privacy and Cybersecurity.

