Firewall Wizards mailing list archives
Re: Linked-in and its Phishing-like contacts option!
From: David Lang <david () lang hm>
Date: Mon, 29 Apr 2013 08:29:27 -0700 (PDT)
On Fri, 26 Apr 2013, Gautier . Rich wrote:
Yes, that's what I meant...turn off Webmail access entirely - I was mostly kidding - but if it's something that you can afford to do [users all have working VPNs, e.g.] - it would reduce a great deal of risk. ;)
when you say turn off webmail, do you mean to cut off access to public webmail servers from inside your network? or do you man to not run things like OWA that expose your company mail to the Internet?
David Lang
Oh, and can that guy who gave the "God, whatever you do, don't fire your network geek" speech please come and give a motivational speech here?
Richard Gautier, CISSP Enterprise Architect, Federal Group 650 Massachusetts Avenue NW Suite 510 Washington, DC 20001 Office: (571) 226-8828 | Cell: (703) 231-2156 rgautier () drc com | www.drc.com -----Original Message----- From: firewall-wizards-bounces () listserv icsalabs com [mailto:firewall-wizards-bounces () listserv icsalabs com] On Behalf Of Jim Seymour Sent: Friday, April 26, 2013 11:39 AM To: firewall-wizards () listserv icsalabs com Subject: Re: [fw-wiz] Linked-in and its Phishing-like contacts option! On Wed, 24 Apr 2013 19:26:01 +0000 "Gautier . Rich" <RGautier () drc com> wrote:Thoughts? I'm wondering why User Operational Security falls under the realm of Firewall Wizards..I think of it this way: Firewall security, in and of itself, doesn't get the job done. You may have the most bullet-proof border the world has ever seen, but, unless that bullet-proof-ness means essentially blocking everything, both incoming and outgoing, it will not be enough. A layered defense is mandatory. One of those layers is end-user operational security. Our goal is to protect the organizational jewels, no? Besides: We've pretty-much beaten stateful/deep-packet inspection vs. application proxy to death, no? :)... plenty of users seem to be perfectly willing to accept the risk (or be unaware of it).Both, IME.However, not much you can do on the firewall side other than turning off webmail access...Turning off webmail access? How would one accomplish that, exactly, without essentially turning off web access entirely? As for LinkedIn: I've received so many LinkedIn emails reported as spam at work that they've occasionally been there. I may have them listed on my mailserver at home, for the same reason. (Possibly so. Can't say as I've seen LinkedIn spam for a while.) This nonsense of them asking for "work email password" is grounds, in _my_ view, to block them entirely. That's intolerable. I'm going to see if I can do that. But I'm old school. I don't believe convenience, golly-gee-whiz-bang, and _especially_ "social networking" ought to trump security. Generally my bosses tend to agree. (Esp. ever since a couple of the Big Guys attended some-or-another network security briefing, which incl. a retired FBI agent, and were told that "whatever your network security is, it's probably not good enough" and "for God's sake, whatever you do, do not lose your network geek" ;).) Regards, Jim -- Note: My mail server employs *very* aggressive anti-spam filtering. If you reply to this email and your email is rejected, please accept my apologies and let me know via my web form at <http://jimsun.LinxNet.com/contact/scform.php>. _______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards ________________________________ This electronic message transmission and any attachments that accompany it contain information from DRCĀ® (Dynamics Research Corporation) or its subsidiaries, or the intended recipient, which is privileged, proprietary, business confidential, or otherwise protected from disclosure and is the exclusive property of DRC and/or the intended recipient. The information in this email is solely intended for the use of the individual or entity that is the intended recipient. If you are not the intended recipient, any use, dissemination, distribution, retention, or copying of this communication, attachments, or substance is prohibited. If you have received this electronic transmission in error, please immediately reply to the author via email that you received the message by mistake and also promptly and permanently delete this message and all copies of this email and any attachments. We thank you for your assistance and apologize for any inconvenience. _______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
_______________________________________________ firewall-wizards mailing list firewall-wizards () listserv icsalabs com https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: Linked-in and its Phishing-like contacts option!, (continued)
- Re: Linked-in and its Phishing-like contacts option! Marcus Ranum (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! Bennett Todd (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! Michael D. Wood (Apr 25)
- Re: Linked-in and its Phishing-like contacts option! Gautier . Rich (Apr 25)
- Re: Linked-in and its Phishing-like contacts option! Paul D. Robertson (Apr 25)
- Re: Linked-in and its Phishing-like contacts option! Jim Seymour (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! Bennett Todd (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! Marcus Ranum (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! Jim Seymour (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! Gautier . Rich (Apr 26)
- Re: Linked-in and its Phishing-like contacts option! David Lang (Apr 30)