' Security is an ongoing process, not a one time event ! '
Erik Goldoff IT Consultant Systems, Networks, & Security ' Security is an ongoing process, not a one time event ! ' From: Andrew S. Baker [mailto:[email protected]] Sent: Tuesday, May 03, 2011 3:40 PM To: NT System Admin Issues Subject: Re: Sony PSN hack ... was waiting for this ... Too many people view security as a static entity. "Am I secure?" is a question that is only relevant at the moment you ask it, so you'd better be asking it a lot... ASB (Professional Bio <http://about.me/Andrew.S.Baker/bio> ) Harnessing the Advantages of Technology for the SMB market... On Tue, May 3, 2011 at 3:31 PM, Ziots, Edward <[email protected]> wrote: A lot of companies are in this same predicament when it comes to the security posture of their infrastructure systems, because they never considered the security implementations when they was designing there systems, nor did they consider all the ways it could be exploited and the fallout from that. Sincerely, EZ Edward E. Ziots CISSP, Network +, Security + Security Engineer Lifespan Organization Email:[email protected] <mailto:email%[email protected]> Cell:401-639-3505 -----Original Message----- From: Steven M. Caesare [mailto:[email protected]] Sent: Tuesday, May 03, 2011 3:27 PM To: NT System Admin Issues Subject: RE: Sony PSN hack ... was waiting for this ... 3) A review of the system architecture and the security mechanisms (or lack thereof) found it to be such a disaster they are largely starting from the ground up. -sc > -----Original Message----- > From: Ben Scott [mailto:[email protected]] > Sent: Tuesday, May 03, 2011 3:21 PM > To: NT System Admin Issues > Subject: Re: Sony PSN hack ... was waiting for this ... > > On Tue, May 3, 2011 at 12:03 PM, Andrew S. Baker <[email protected]> > wrote: > > They're up to 100 mill accounts, assuming no duplicates... > > And they've been down a *long* time. The longer they kept the cord cut, > the more we will wonder why. > > <wild speculation> Maybe they've uncovered evidence this is either > (1) an inside job, or (2) something more than routine identify theft (e.g., > industrial espionage). </wild speculation> > > -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
