Uh... Isn't Adobe a major Fortune 500 company?
Also, you'd be surprised at how many organizations are being breached these days -- most of them having nothing to do with the cloud. Here are some of the big ones for the year: http://www.scmagazine.com/top-five-data-breaches-in-2013so-far/slideshow/1387/#1 Here are some breach stats that you might not be aware of: http://www.indefenseofdata.com/data-breach-trends-stats/ Also: Nearly 40 percent of all attacks hit large organizations, but smaller organizations represented a large number of breached organizations when it came to cyberespionage-type attacks: Some 22 of the organizations suffering cyberespionage last year were firms with only one to 100 employees, mainly in manufacturing and professional services, and 23 firms with 101 to 1,000 employees, mainly in manufacturing. Firms with 1,001 to 10,000 employees accounted for 36 of the cyberespionage attacks. http://www.darkreading.com/attacks-breaches/no-one-size-fits-all-in-data-breaches-ne/240153379 Regards, *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>* **Providing Virtual CIO Services (IT Operations & Information Security) for the SMB market…*** On Mon, Oct 14, 2013 at 10:41 AM, Jon D <[email protected]> wrote: > I love how everyone always says how the cloud is more secure than > individual companies. > HA! > When's the last time you've heard of a friends company getting hacked? > And when's the last time you've heard of a major fortune 500 getting > hacked. > No contest. Cloud loses every time. > > > > > > On Fri, Oct 4, 2013 at 8:59 AM, Ziots, Edward <[email protected]> wrote: > >> >> http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729 >> **** >> >> ** ** >> >> Z**** >> >> ** ** >> >> Edward E. Ziots, CISSP, CISA, Security +, Network +**** >> >> Security Engineer**** >> >> Lifespan Organization**** >> >> [email protected]**** >> >> Work:401-255-2497**** >> >> ** ** >> >> ** ** >> >> This electronic message and any attachments may be privileged and >> confidential and protected from disclosure. If you are reading this >> message, but are not the intended recipient, nor an employee or agent >> responsible for delivering this message to the intended recipient, you are >> hereby notified that you are strictly prohibited from copying, printing, >> forwarding or otherwise disseminating this communication. If you have >> received this communication in error, please immediately notify the sender >> by replying to the message. Then, delete the message from your computer. >> Thank you.**** >> >> *[image: Description: Description: Lifespan]* >> >> ** ** >> >> ** ** >> >> *From:* [email protected] [mailto: >> [email protected]] *On Behalf Of *Webster >> *Sent:* Friday, October 04, 2013 8:13 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> ** ** >> >> Very few (of the sites I go to) ever look at the privileged accounts. >> The last assessment I did had over 100 DA accounts and almost as many EA >> and SA accounts. The majority of their service accounts were in all three >> groups!!! Until I ran MBS’ script, they had no idea how many local SQL >> Server and SQL Express installs had been done using the domain’s SQL >> Service account and that account was a member of all three privileged >> groups.**** >> >> ** ** >> >> ** ** >> >> Webster**** >> >> ** ** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Free, Bob >> *Sent:* Thursday, October 03, 2013 11:52 PM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> ** ** >> >> The first two I get, the third is really hard to comprehend.**** >> >> ** ** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Webster >> *Sent:* Thursday, October 03, 2013 8:09 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> ** ** >> >> MBS’ script works like a charm. I have used it when doing assessments >> for AD migrations. I have NEVER seen an IT org that knew every service >> account used, where they were used or how many of those service accounts >> had domain admins privileges.**** >> >> ** ** >> >> Webster**** >> >> ** ** >> >> ** ** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Michael B. Smith >> *Sent:* Thursday, October 03, 2013 11:00 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] RE: Account Utility**** >> >> ** ** >> >> >> http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx >> **** >> >> ** ** >> >> ** ** >> >> *From:* [email protected] [ >> mailto:[email protected] <[email protected]>] *On >> Behalf Of *Steve Norton >> *Sent:* Thursday, October 3, 2013 8:10 AM >> *To:* [email protected] >> *Subject:* [NTSysADM] Account Utility**** >> >> ** ** >> >> A long time ago I used a utility that showed me what account services >> were running under on all my servers. My environment is Windows 2003 and >> 2008 R2. Ideally this would be a utility that I can run from a Windows 7 >> workstation against servers. Suggestions appreciated.**** >> >> ** ** >> ------------------------------ >> >> PG&E is committed to protecting our customers' privacy. >> To learn more, please visit >> http://www.pge.com/about/company/privacy/customer/**** >> ------------------------------ >> > >
<<image001.jpg>>

