On Fri, 2021-06-25 at 15:18 -0700, Michael Thomas wrote:
> On 6/25/21 8:39 AM, Karl Auer wrote:
> > We need to start building systems that are not seamless, that are
> > not highly interchangeable, that are not fully interconnected, and
> > we have to include our human systems in that approach.
>
I thought I would post an interesting comparison between a degraded DOCSIS3
link, of a carrier that shall remain nameless to avoid embarrassing
anybody, and a starlink CPE with a slight 1/12th tree obstruction in a
portion of its view.
First two screenshots are the docsis3, to its gateway and to
On 6/25/21 8:39 AM, Karl Auer wrote:
On Fri, 2021-06-25 at 10:05 -0400, Tom Beecher wrote:
Everything can be broken, and nothing will ever be 100% secure. If
you strive to make sure the cost to break in is massively larger than
the value of what could be extracted, you'll generally be ahead
I found the routing, peering, and dns support number. Hopefully that will
help
Mike
On Fri, Jun 25, 2021 at 4:51 PM harbor235 wrote:
> Noggers,
>
> Having some O365 DNS issues, looks like we are getting directed to EMEA
> instead of US. Anybody understand O365 A record location syntax? Any
fre. 25. jun. 2021 21.33 skrev Aaron C. de Bruyn via NANOG :
> On Fri, Jun 25, 2021 at 10:43 AM Tom Beecher wrote:
>
>> Incompetent insurance companies combined with incompetent IT staff and
>>> under-funded IT departments are the nexus of the problem.
>>>
>>
>> Nah, it's even simpler. It's just
Noggers,
Having some O365 DNS issues, looks like we are getting directed to EMEA
instead of US. Anybody understand O365 A record location syntax? Any one
else have issues being directed to EMEA?
Is there a direct MS O365 DNS support number? I have the O365 biz support?
Mike
On Fri, Jun 25, 2021 at 10:43 AM Tom Beecher wrote:
> Incompetent insurance companies combined with incompetent IT staff and
>> under-funded IT departments are the nexus of the problem.
>>
>
> Nah, it's even simpler. It's just dollars all around. Always is.
>
Agreed.
> From this company's
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.
Daily listings are sent to
>
> Incompetent insurance companies combined with incompetent IT staff and
> under-funded IT departments are the nexus of the problem.
>
Nah, it's even simpler. It's just dollars all around. Always is.
>From this company's point of view, the cost to RECOVER from the problems is
so much smaller
On 6/25/21 5:25 AM, Jim wrote:
On Thu, Jun 24, 2021 at 5:41 PM Brandon Svec via NANOG wrote:
I think a big problem may be that the ransom is actually very cost effective
and probably the lowest line item cost in many of these situations where large
revenue streams are interrupted and
On Fri, 2021-06-25 at 10:05 -0400, Tom Beecher wrote:
> Everything can be broken, and nothing will ever be 100% secure. If
> you strive to make sure the cost to break in is massively larger than
> the value of what could be extracted, you'll generally be ahead of
> the game.
Easy to say.
IMHO
> The goal is to make your business very difficult to hack that it is no
> longer economically viable for terrorists to attack it in the first place.
>
> That’s the best insurance you can give to your business.
And yet, so often their system is vulnerable owing to ineptness, cluelessness,
On Fri, Jun 25, 2021 at 5:28 AM Jim wrote:
> Big problem that with organizations' existing Disaster Recovery DR methods
> --
> the time and cost to recovery from any event including downtime will
> be some amount.. likely a high one,
> and criminals' ransom demands will presumably be set as high
I agree with you that 100% secure is not achievable.
The goal is to make your business very difficult to hack that it is no longer
economically viable for terrorists to attack it in the first place.
That’s the best insurance you can give to your business.
Jean
>
> The payment to ransomware gangs is now tax-deductible.
>
It's not new. In the US, losses due to theft have been at least partly
deductible for a very long time. By IRS definitions (
https://www.irs.gov/publications/p547), blackmail and extortion both
qualify as theft, and it's fairly safe to
Hi NANOG,
CPF for LACNOG 2021 is now open.
Feel free to contact me off list if you have any questions.
Thanks.
HM
LACNOG 2021 - Call for Presentations
LACNOG, the Latin American and Caribbean Network Operators Group, will
hold its LACNOG 2021 conference from 11 to 15 October 2021
Hi Jim,
Very nice text from you and you seem to offer good hints on how to stop it long
term.
The reality is that USA is going in the direct opposing direction that you
express.
The payment to ransomware gangs is now tax-deductible.
"Extorted by ransomware gangs? The payments may be
On Thu, Jun 24, 2021 at 5:41 PM Brandon Svec via NANOG wrote:
>
> I think a big problem may be that the ransom is actually very cost effective
> and probably the lowest line item cost in many of these situations where
> large revenue streams are interrupted and time=money (and maybe also health
NEW ZEALAND HEALTH EXPERIENCE AND DISCUSSION
Some of you may be aware that one of our major hospitals was taken off
line with 680 compromised servers.
Discussion on one local list is that the systems have been open for some
time and the rnasom hackers didn't open the systems, they have just
Here are some facts that it’s important to not pay them.
80% of ransomware victims suffer repeat attacks, according to new report
https://www.cbsnews.com/news/ransomware-victims-suffer-repeat-attacks-new-report/
published June 17th 2021
Don’t pay them. Just clean your mess.
20 matches
Mail list logo