Video Hub
Video

Data Exfiltration Use Case

Excerpt From SECDEF Memo – Impacts on SCIF/SAPF Security Webinar
Watch the Video Below to Learn About the Data Exfiltration Use Case
CTO Dr. Brett Walkenhorst illustrates a scenario where an insider attempts to extract classified files from a secure facility. The insider enters the building with a hotspot and a Wi-Fi dongle in order to connect and steal information over the cellular network. To get around detection sensors, they turn off the equipment. Once inside, they initiate the hotspot, link the dongle to a protected PC, and move the data. The insider can destroy the equipment to reduce the possibility of being discovered departing the building. Learn more about this explanation in the clip below.

Close your cybersecurity gaps with AI-driven wireless visibility

See Bastille in action with a live demo from our experts in wireless threat detection.