Being an IT professional it has hard to point fingers anywhere but
myself for my clients who have been infected. On that note, I quickly
remind them how the proposal for Antigen or Mail Essentials sat on their
desk for the past 6 months. However, if I was working at my previous job
and we got infected with similar means I would have to answer to
somebody. Once is a mistake, twice is neglicence. 

After most people got hit with code red and all the news surrounding it
I would think they would have patched their servers, and double checked
everything. Afterall codered was just a couple of months ago, on the
same exploit used by this one. 

I hope the FBI doesn't function this way else Im staying out of large
buildings for another few years.. :)

The bottom line is its hard to be 100%, 100% of the time, but to be hit
by the same vulnerability that was exploited months ago, and patched
months before that is really not an excuse. If you are Microsoft, Dell
etc etc this error is simply magnified due to the popularity of the
sites..





http://www.sunbelt-software.com/ntsysadmin_list_charter.htm

Reply via email to