On Tue, May 3, 2011 at 3:27 PM, Steven M. Caesare <[email protected]> wrote: >> Maybe they've uncovered evidence this is either (1) an inside >> job, or (2) something more than routine identify theft >> (e.g., industrial espionage). > > 3) A review of the system architecture and the security mechanisms (or > lack thereof) found it to be such a disaster they are largely starting > from the ground up.
And would that be worse or better? -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
