Officials failed to identify and authenticate users, encrypt classified information, monitor compliance with policies, or check that settings are up to date. Information security weaknesses continue ...