Here on Earth, organizations should be sure to setup disk encryption for all their machines. You have to wonder: even if Jyn Erso and her friends stole the plans to the Death Star, why weren’t they properly encrypted so the rebels couldn’t read them? Surely, an empire capable of building something as big as the Death Star could pony up some computers to encrypt the plans to their ultimate weapon. So what can we learn from their mistakes about security and compliance? Not Encrypting Death Star Plans I think it’s safe to say that the imperials are not employing the best security practices. But when you consider how powerful the Empire is compared to the relatively meager rebel forces, it’s uncanny how our heroes were able to infiltrate the Death Star, rescue Princess Leia, and completely obliterate the station. Having not seen Rogue One yet, I can’t speak to the details of how the Death Star plans get stolen. This, of course, sets the stage for the original Star Wars movie, now called Episode 4, where Luke Skywalker and the gang use the stolen information to destroy the Death Star. The story follows rebellious protagonist, Jyn Erso, as she joins the Rebel Alliance and works with her team to steal the design schematics of the Empire’s new superweapon, the Death Star. Tomorrow marks the release of the first ever standalone Star Wars film, Rogue One.