Ha ha , the irony is I quoted Ed's famous words just a few days ago in an
executive briefing.

On Fri, May 9, 2008 at 3:31 PM, Micheal Espinola Jr <
[EMAIL PROTECTED]> wrote:

> I have to agree with Jason's smart-assed response.  :-)
>
> If you make the data available, someone or something will be able to
> replicate it.  This is a battle you cannot win.
>
>   http://www.espinola.net/wiki/Crowley's_law
>
>
> On Fri, May 9, 2008 at 3:17 PM, Jason Gurtz <[EMAIL PROTECTED]>
> wrote:
> >> That is what I want to do.  However, people are bypassing.
> >
> > Oh common users *never* try to do that  ;)
> >
> >> They can access via their home computer.  The difference is the home
> >> computer is not on their hip around town with a much greater chance of
> >> getting lost or stolen.
> >
> > I guess management is certain that none of your users have a personal
> > laptop that they bring into starbucks or on vacation.
> >
> >>  Also, unlike a browser based view, the method they are using is
> >> downloading every message, as well as storing the password.
> >
> > I hope it isn't breaking news that all three of the top browsers (IE,
> > Firefox, Opera) will save user login information.  Hmmm, what about that
> > pesky cache directory...
> >
> >>  So with the blackberry, they aren't just accessing the webpage (in the
> >> classic sense)
> >
> > I hope that smart aleck John Doe from accounting doesn't figure out how
> to
> > use foo mail utility he found on file forum, or powershell or Perl or
> > Python scripting or ...  Darnit, is that Jane over there taking CSC
> > classes at the local community college?  Yikes, and they're learning
> about
> > networking and http too!?  I'm not trying to be denigrating here, but
> > hopefully you'll see some of the very real possibilities. (FYI: no less
> > than three non-IT personnel here are doing exactly what I am talking
> about
> > in the latter example).
> >
> > I think the bottom line is that your problem is one of policy, not of
> > inadequate technical solutions.  You will have to spearhead a paradigm
> > shift away from a reactive and security-through-obscurity based culture
> to
> > one of proactive and decisive control.  One way to start is locking
> > certain things behind a VPN. Then, make sure that policy requires the CEO
> > or some other high level executive to sign off on requests for access.
> > Many users won't even ask. :)  At worst, make it policy not to access
> > corporate email via BIS.  When people do it anyway, document and write
> > them up.  When people complain about performance point at the policy;
> > point at lack of support and enforcement from management.  You don't have
> > to be offensive, but do lay the facts on the table.
> >
> > ~JasonG
> >
> > --
> >
> > ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
> > ~             http://www.sunbeltsoftware.com/Ninja                ~
> >
>
>
>
> --
> ME2
>
> ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
> ~             http://www.sunbeltsoftware.com/Ninja                ~
>

~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~
~             http://www.sunbeltsoftware.com/Ninja                ~

Reply via email to