I love how everyone always says how the cloud is more secure than
individual companies.
HA!
When's the last time you've heard of a friends company getting hacked?
And when's the last time you've heard of a major fortune 500 getting hacked.
No contest. Cloud loses every time.





On Fri, Oct 4, 2013 at 8:59 AM, Ziots, Edward <[email protected]> wrote:

>
> http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729
> ****
>
> ** **
>
> Z****
>
> ** **
>
> Edward E. Ziots, CISSP, CISA, Security +, Network +****
>
> Security Engineer****
>
> Lifespan Organization****
>
> [email protected]****
>
> Work:401-255-2497****
>
> ** **
>
> ** **
>
> This electronic message and any attachments may be privileged and
> confidential and protected from disclosure. If you are reading this
> message, but are not the intended recipient, nor an employee or agent
> responsible for delivering this message to the intended recipient, you are
> hereby notified that you are strictly prohibited from copying, printing,
> forwarding or otherwise disseminating this communication. If you have
> received this communication in error, please immediately notify the sender
> by replying to the message. Then, delete the message from your computer.
> Thank you.****
>
> *[image: Description: Description: Lifespan]*
>
> ** **
>
> ** **
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Webster
> *Sent:* Friday, October 04, 2013 8:13 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: Account Utility****
>
> ** **
>
> Very few (of the sites I go to) ever look at the privileged accounts.  The
> last assessment I did had over 100 DA accounts and almost as many EA and SA
> accounts.  The majority of their service accounts were in all three
> groups!!!   Until I ran MBS’ script, they had no idea how many local SQL
> Server and SQL Express installs had been done using the domain’s SQL
> Service account and that account was a member of all three privileged
> groups.****
>
> ** **
>
> ** **
>
> Webster****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Free, Bob
> *Sent:* Thursday, October 03, 2013 11:52 PM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: Account Utility****
>
> ** **
>
> The first two I get, the third is really hard to comprehend.****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Webster
> *Sent:* Thursday, October 03, 2013 8:09 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: Account Utility****
>
> ** **
>
> MBS’ script works like a charm.  I have used it when doing assessments for
> AD migrations.  I have NEVER seen an IT org that knew every service account
> used, where they were used or how many of those service accounts had domain
> admins privileges.****
>
> ** **
>
> Webster****
>
> ** **
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Michael B. Smith
> *Sent:* Thursday, October 03, 2013 11:00 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: Account Utility****
>
> ** **
>
>
> http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx
> ****
>
> ** **
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Steve Norton
> *Sent:* Thursday, October 3, 2013 8:10 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] Account Utility****
>
> ** **
>
> A long time ago I used a utility that showed me what account services were
> running under on all my servers. My environment is Windows 2003 and 2008
> R2. Ideally this would be a utility that I can run from a Windows 7
> workstation against servers. Suggestions appreciated.****
>
> ** **
>  ------------------------------
>
> PG&E is committed to protecting our customers' privacy.
> To learn more, please visit
> http://www.pge.com/about/company/privacy/customer/****
>  ------------------------------
>

<<image001.jpg>>

Reply via email to