Skip to comments.
The most insecure part of your network is...
IT World ^
| 11 January 2010
| sjvn
Posted on 01/13/2010 6:16:40 AM PST by ShadowAce
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-37 next last
1
posted on
01/13/2010 6:16:41 AM PST
by
ShadowAce
To: rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...
2
posted on
01/13/2010 6:17:08 AM PST
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: ShadowAce
end users.....without a doubt it’s the nut behind the keyboard.....
To: ShadowAce
[...] your real security problem is the people sitting between their keyboards and their displays Yes...climbing up onto the desk is a dead giveaway.
PEBCAK with this column. :-)
4
posted on
01/13/2010 6:29:21 AM PST
by
Gondring
(Paul Revere would have been flamed as a naysayer troll and told to go back to Boston.)
To: ShadowAce
your real security problem is the people sitting between their keyboards and their displays.I agree. If I saw anyone sitting between their keyboard and monitor, I'd be pretty sure they had a problem.
5
posted on
01/13/2010 6:31:06 AM PST
by
Still Thinking
(Quis custodiet ipsos custodes?)
To: ShadowAce
"The most insecure part of your network is..."Without a doubt ....the people using it.
6
posted on
01/13/2010 6:33:29 AM PST
by
KoRn
(Department of Homeland Security, Certified - "Right Wing Extremist")
To: Gondring
7
posted on
01/13/2010 6:34:08 AM PST
by
Still Thinking
(Quis custodiet ipsos custodes?)
To: rightwingextremist1776
end users.....without a doubt its the nut behind the keyboard..... I like to call them.....Lusers.
8
posted on
01/13/2010 6:37:55 AM PST
by
Bloody Sam Roberts
(An armed man is a citizen. An unarmed man is a subject.)
To: ShadowAce
We are the security risks we’ve been waiting for.
9
posted on
01/13/2010 6:40:59 AM PST
by
posterchild
(Endowed by my Creator with certain unalienable rights.)
To: Bloody Sam Roberts
When they ask me what was wrong with their computer I like to tell them “OH...just another ID10T error”....
To: ShadowAce
I guess the only really safe thing to do, is not have any end-users.
11
posted on
01/13/2010 6:50:13 AM PST
by
stuartcr
(If we are truly made in the image of God, why do we have faults?)
To: ShadowAce
My nightmare day as IT Manager usually begins with “I had a spyware warning come up on my machine and I installed it and now I keep getting popups.”
12
posted on
01/13/2010 6:52:28 AM PST
by
TC Rider
(The United States Constitution - 1791. All Rights Reserved.)
To: ShadowAce
A company nearby (which employs a family member of mine as their IT manager) has hired an external data-security firm to test its network. Many of those tests are unannounced and some have shown some very serious weak points.
My kin told me that his company did well on almost all the typical areas: firewalls, physical access to datacenters, change control, OS/application patching, etc. However, they failed miserably overall because of employees.
One test that 90% of employees failed was the "free flash drive" test. The test involves dropping USB flash drives in the parking lot (or giving them away as a promotion somewhere). Software on the drive launches, does some scans, then sends PC/network data to the 'hacking' company. 9 out of 10 people picked up the drives, brought them inside the building, and plugged them into their work PCs. Ouch.
13
posted on
01/13/2010 6:54:31 AM PST
by
DesertSapper
(God, Family, Country . . . . . . . . . . and dead terrorists!!!)
To: stuartcr
I guess the only really safe thing to do, is not have any end-users. That's extreme. The perfectly reasonable answer is that they need to be registered, plus have a waiting period and monthly limit.
14
posted on
01/13/2010 6:54:35 AM PST
by
Gondring
(Paul Revere would have been flamed as a naysayer troll and told to go back to Boston.)
To: Gondring
I guess the only really safe thing to do, is not have any end-users.That's extreme. The perfectly reasonable answer is that they need to be registered, plus have a waiting period and monthly limit.
I just charge them for any help they get.
15
posted on
01/13/2010 6:57:13 AM PST
by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: stuartcr
I guess the only really safe thing to do, is not have any end-users.
16
posted on
01/13/2010 6:59:29 AM PST
by
paulycy
(The Liberals' DOUBLE-STANDARDS are HATE CRIMES.)
To: Gondring
lol...
And, yes, I concur—PEBCAK constitutes about 95% of my IT issues. Every time I figure there’s NO WAY someone could be dumber than that last guy, an even dumber one shows up to prove me wrong.
17
posted on
01/13/2010 7:05:00 AM PST
by
Future Snake Eater
("Get out of the boat and walk on the water with us!”--Sen. Joe Biden)
To: paulycy
Had a negotiation recently with an attorney who sounded
just like that on the phone.
Whenever he said, "I'm sorry, I can't do that..." I wanted to reach down his throat and pull out his chips.
To: DesertSapper
Very creative...there’s another office, a rather large one that fell for a similar scam...what was it called...? Oh yeah, the Pentagon.
19
posted on
01/13/2010 7:06:40 AM PST
by
Future Snake Eater
("Get out of the boat and walk on the water with us!”--Sen. Joe Biden)
To: martin_fierro
I wanted to reach down his throat and pull out his chips. It was a lawyer. Maybe you should have. Who would blame you?
20
posted on
01/13/2010 7:06:46 AM PST
by
paulycy
(The Liberals' DOUBLE-STANDARDS are HATE CRIMES.)
Navigation: use the links below to view more comments.
first 1-20, 21-37 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson