The explanation of the compromises is fairly straightforward and in no way unexpected. The advice at the end of the article is just as straightforward and very sound. Two-factor authentication and end user awareness and education can resolve many of these problems.
https://nakedsecurity.sophos.com/2016/10/25/how-hackers-broke-into-john-podesta-dnc-gmail-accounts/