On Tue, May 3, 2011 at 3:27 PM, Steven M. Caesare <[email protected]> wrote:
>> Maybe they've uncovered evidence this is either (1) an inside
>> job, or (2) something more than routine identify theft
>> (e.g., industrial espionage).
>
> 3) A  review of the system architecture and the security mechanisms (or
> lack thereof) found it to be such a disaster they are largely starting
> from the ground up.

  And would that be worse or better?

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to