I've actually used the line (or some derivation of it) in the second to
last frame. Of course, it happened to be true in my case.
On Fri, Oct 26, 2012 at 10:35 AM, Hank . wrote:
> http://www.dilbert.com/2012-10-21/
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~
http://www.usatoday.com/story/news/nation/2012/10/26/hacker-south-caroli
ng-social-security-numbers/1660929/
That at 16K in CC data that wasn't encrypted was stolen. ( total of
387K exposed)
Z
Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi.
Our organization is in state government, so take this with a grain of salt.
I work for Department of Fish and Game, which is under the California Resources
Agency.
Within the Department, we have Divisions (Admin Division, etc.) Under the
Divisions, we have Branches. So, I work for ITB (Informat