OT: CryptoWall Alert
Fairlight
fairlite at fairlite.com
Thu Oct 2 12:26:07 PDT 2014
On Wed, Oct 01, 2014 at 06:55:01PM +0000, Richard Kreiss thus spoke:
> I have one client who avoids this issue; no one has access to the
> internet or get emails or can browse the web. However, one computer
> links directly to the UPS web-site, and one other person has access to a
> limited number of web-sites. The one other employee who had access aa
> few years back was fired for downloading games for her son to play when
> he visited her. She had been forewarned that this would happen if she
> downloaded anything. No virus infections but she was still fired.
>
> This should happen at more companies when employees spent time browsing
> the web or shopping on line rather than working. This would have to be
> applied from the top down.
I've seen that backfire. When my wife was with the state DoT, they fell
victim to a virus from some illicitly installed software. The instituted a
zero-tolerance policy against it. Install -anything- not on the "approved"
list, and you were subject to immediate termination.
A month or few later, they upgraded to the latest version of a traffic
modeling software package, and my wife, having picked up a few things
from me, actually was the -only- person to scan the officially sanctioned
floppies from the vendor -before- installing. They were infected. She was
the -only- one who noticed.
Even officially trusted channels cannot be flatly trusted. If someone
says, "Trusted system," to me, I already know they're out of touch with
reality.
mark->
--
Audio panton, cogito singularis.
More information about the Filepro-list
mailing list