On Wed, Jun 6, 2012 at 2:07 PM, David Lum <[email protected]> wrote:
> We fired off an advisory e-mail to our staff about LinkedIn and recommending
> they change their password, and included links to both the LinkedIn Tweet
> and the CNet article. After the e-mail went out I got bombed by our Service
> Desk guys (it was my recommendation to send it) asking why we would want to
> do such a thing since “it’s not our website”.
>
> I felt the scope was sufficient and the business use adequate enough to
> warrant notifying our employees. I had folks above me agree with me (else it
> wouldn’t have been sent), and the front line guys disagree. This is one of
> those judgment calls where everyone is going to handle it differently.
>
> Did any of you guys send a note out to your staff?
>
> David Lum
> Systems Engineer // NWEATM
> Office 503.548.5229 // Cell (voice/text) 503.267.9764
Absolutely - within 15 minutes of seeing the article that ASB posted,
and I've been thanked by email and in person, by at least 5 of our
staff today.
It might not be our web site, but
o- It's used by businesses to find and contact us
o- it's used by some here to find and work with customers of ours
Now, if it were Facebook, or a bank in Utah (or eharmony, which seems
to have had their password hashes posted at the same time as and by
the same people who exposed LinkedIn), I doubt I'd send out anything -
let them burn, for all I care. They are not business-related, and more
importantly they're not related to *our* business.
Kurt
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
---
To manage subscriptions click here:
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin