Post hack, is also a *good* time to get management approval to have *all*
internet gateways across the organisation security tested by a 3rd party
test specialist.

Even better, plan a rolling program of say quarterly testing.

That way you can compare countries/gateways and ensure that all sites are
improving.

Check out www.nta-monitor.com for details on our own test service- and a
client list of over 200 major corporates world wide

Deri Jones
NTA Monitor
+44 1634 721855
[EMAIL PROTECTED]
===========================

At 05:50 12/05/00 -0700, Peter Goodridge wrote:
>
>Despite my objections someone *had* to have a NT
>webserver at a remote site without bothering with a
>firewall.   Now that they've been hacked I'd like to
>get some advice, on how they should go about cleaning
>the thing up.   I am not an NT person.   Any advice
>will be appreciated.   Yes, I'm also gong to try to
>get it properly protected.
>
>Suggestions that it be cleaned with Hydrochloric acid
>will be amusing...
>
>THX,
>Pete Goodridge
>
>__________________________________________________
>Do You Yahoo!?
>Send instant messages & get email alerts with Yahoo! Messenger.
>http://im.yahoo.com/
>
>
>===========================================================================
=====
>     To unsubscribe from this mailing list, please see the instructions at
>               http://www.checkpoint.com/services/mailing.html
>===========================================================================
=====
>
>



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to