Mike Hammett wrote:
> What about forcing those accounts to change paswords?

I've been doing that - again, I'm trying to be proactive rather than 
reactive. If I told my boss "yeah, we need to change everyone's 
password" he'd laugh at me. And not in a funny-ha-ha way.

The computer belonging to the most recent compromised account is on our 
workbench right now. My PC-cleanup-guy says he thinks it may have set a 
new record for number of viruses and spyware on one machine; we're not 
even sure we can clean it up. We may have to give it back and tell them 
it needs a full reformat.

Given that lots of customers have computers that are screwed-up in that 
same way, even changing everyone's passwords is of questionable value - 
they'll still have the same keyloggers on their computers, sending these 
passwords off to Nigeria or wherever. This isn't a college campus; I 
can't force my users to have current AV software, or else deny them 
access. Sometimes I wish I could, but...

There will be compromises. I accept this as fact. It's effectively 
impossible to keep thousands of end-user PCs perfectly clean, especially 
given our largely-residential, largely-rural, largely-non-techie 
customer base. I'm just trying to minimize the damage in a proactive way.

David Smith
MVN.net


--------------------------------------------------------------------------------
WISPA Wants You! Join today!
http://signup.wispa.org/
--------------------------------------------------------------------------------
 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

Reply via email to