U.S. House to toughen internal cybersecurity policy

Share this article:

Congressional leaders on Tuesday accepted five new cybersecurity policy recommendations aimed at protecting sensitive information belonging to the U.S. House and securing its IT systems from attack.

The proposed changes were crafted by Daniel Beard, the House's chief administrative officer, who was asked by Speaker Nancy Pelosi and Minority Leader John Boehner to conduct an assessment of the lower chamber's information security policies.

The new guidelines, set to take effect next year, require all House staff and members to undergo an annual cybersecurity training program, according to a letter from Beard to his House colleagues. Employees who travel out of the country will be required to have their wireless devices and laptops screened for malware prior to departing and upon returning.

In addition, the rules dictate that any sensitive information be encrypted when stored on mobile devices, and properly protected when being transmitted across a public network. Mobile devices, such as iPhones and BlackBerries, also must be password protected and locked when not in use.

The new policy additionally calls for the House to deploy additional firewall protocols.

Leaders called on Beard to oversee the review after a now-fired junior staffer for the House Standards Committee leaked confidential information on a peer-to-peer network, a spokesman for the Office of the Chief Administrative Officer told SCMagazineUS.com on Wednesday. The document that the staffer leaked contained information into the ethics probes of a number of Congressional members and their aides.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.