Patching public-facing systems now... Grrrrrrr.
On Wed, Nov 12, 2014 at 8:56 PM, Andrew S. Baker <[email protected]> wrote: > There's nothing in the wild *as yet*, but given the wormable potential, I > would expect exploit code within 4-6 business days. > > Patch perimeter exposed systems as soon as you can, and work from there. > > Be advised that if a client system gets hit, it will be able to hit all > the systems that it has access to within your network. > > Regards, > > > > > > > *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker> > *Providing Virtual CIO Services (IT Operations & Information Security) for > the SMB market…* > > > > On Wed, Nov 12, 2014 at 3:06 PM, geoff taylor <[email protected]> > wrote: > >> Looking for opinions on how urgent this is, and your plan of attack. >> No shortage of people crying Wolf. As usual SANs is balanced and sane >> recognizing the possible severe implications and yet acknowledging that a >> well thought out patching approach (expedited perhaps) is the best defense. >> >> >> >> *http://preview.tinyurl.com/phz3my4 <http://preview.tinyurl.com/phz3my4> * >> gt >> > >

