Patching public-facing systems now...

Grrrrrrr.

On Wed, Nov 12, 2014 at 8:56 PM, Andrew S. Baker <[email protected]> wrote:

> There's nothing in the wild *as yet*, but given the wormable potential, I
> would expect exploit code within 4-6 business days.
>
> Patch perimeter exposed systems as soon as you can, and work from there.
>
> Be advised that if a client system gets hit, it will be able to hit all
> the systems that it has access to within your network.
>
> Regards,
>
>
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
>
>
> On Wed, Nov 12, 2014 at 3:06 PM, geoff taylor <[email protected]>
> wrote:
>
>>  Looking for opinions on how urgent this is, and your plan of attack.
>> No shortage of people crying Wolf.  As usual SANs is balanced and sane
>> recognizing the possible severe implications and yet acknowledging that a
>> well thought out patching approach (expedited perhaps) is the best defense.
>>
>>
>>
>> *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> *
>> gt
>>
>
>

Reply via email to