I would like to note on this list as I did recently on another.  The term IT 
professional is used too loosely.  There are few true IT professionals 
anymore.  There are many people who took a cert or two (or worse, got a 
degree) and know their way around Spybot.


-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com



--------------------------------------------------
From: "Scott Lambert" <lamb...@lambertfam.org>
Sent: Friday, January 09, 2009 3:22 PM
To: "WISPA General List" <wireless@wispa.org>
Subject: Re: [WISPA] Barracuda outbounds SPAM filter any good?

> On Fri, Jan 09, 2009 at 01:42:15PM -0600, David E. Smith wrote:
>> Scott Lambert wrote:
>> > Have your techs look at each cutomer's password every time they talk
>> > to a customer.  The customer is already on the phone, "Dang, forgot my
>> > password again."  Help them to choose a better password.
>>
>> Doesn't help, when the problem is their PC has keylogger software on it
>> that sends their new password off to Lower Elbonia.
>
> It does help with the compromises.  If the account is compromised twice,
> the customer has to bring in a "Doctor's note" saying that the system
> has been certified clean by some local, reputable, computer store,
> FOR THEIR PROTECTION, and yours.  If a customer with a dirty computer
> refuses to clean it up and you don't remove their access, your mail
> servers will be blacklisted and all of your customers will be, hmm,
> let's call it slightly peeved?  It can cost less to fire the customer.
>
> Customers often think they are "good with computers" and can use Windows
> Anti-Virus 2008/2009 to clean their own computer.  We give them one
> chance to take care of it themselves.  Then they have to have it done by
> a professional.
>
> After paying to have the computer cleaned a few times, they begin to
> believe us when we say that buying good anti-virus/spyware software,
> yearly, is cheap.
>
> Most of the relays via webmail or SMTP AUTH we have seen have been for
> users with stupid passwords, or users who fell for a phishing message.
> The compromised computers tend to send mail from their computer either
> directly or via our mail servers.  The preemptive changing of weak
> passwords will head off a significant portion of successful relays.
>
> -- 
> Scott Lambert                    KC5MLE                       Unix 
> SysAdmin
> lamb...@lambertfam.org
>
>
>
> --------------------------------------------------------------------------------
> WISPA Wants You! Join today!
> http://signup.wispa.org/
> --------------------------------------------------------------------------------
>
> WISPA Wireless List: wireless@wispa.org
>
> Subscribe/Unsubscribe:
> http://lists.wispa.org/mailman/listinfo/wireless
>
> Archives: http://lists.wispa.org/pipermail/wireless/
> 


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to