I had actually read many more articles regarding that hack. It is a textbook example of why security is a process, not an event, i.e. you need to think about security all the time and adapt to new challenges. I, for one, have found that using a password manager and 14-25 character "line noise" (upper/lower case letter, numbers and symbols) passwords is the best alternative to reusing the same old password all over again. Keeping and replicating encrypted backups of the password database is paramount, of course. Updates? My motto is "update, yesterday" and that's the second slide in my security presentation (the first being "backup, backup and backup").
The most disturbing aspect of the HBGary case is the social engineering part. If someone forgets his username and his password and the server's IP he's most likely a hacker. I'd call the guy right away on his cellphone and ask him straight up "are you being hacked or are you becoming senile?". That's why I ask tons of question when someone emails me about a password reset ;)
Nicholas K. Dionysopoulos
Lead Developer and Director
🇬🇷Greek: native 🇬🇧English: excellent 🇫🇷French: basic • 🕐 My time zone is Europe / Athens
Please keep in mind my timezone and cultural differences when reading my replies. Thank you!