Educause Security Discussion mailing list archives
Question re: inbound executable files
From: ROBERT MYLES <RMYLES () PARKNET PMH ORG>
Date: Thu, 18 Dec 2003 17:29:35 -0600
Yes, At Parkland Health & Hospital System we strip out all attachments with executables and the list recommended by the Systems and Network Attack Center (SNAC) 60 Minute Network Security Guide. Robert Myles, CISSP Information Security Officer Parkland Health & Hospital Systems 6300 Harry Hines Blvd Suite 303 Dallas, TX 75235 214-590-0559 (o) 214-590-4433 (f)
Connie_Sadler () BROWN EDU 12/18/03 04:26PM >>>
Is anyone blocking inbound executable files to help prevent viruses, etc.? Connie J. Sadler, CM, CISSP, CISM Director, IT Security, Brown University Box 1885, Providence, RI 02912 Connie_Sadler () Brown edu PGP Fingerprint: 452A C178 1450 9CE1 3AC1 CC12 956F 2C55 DB94 A9C7 Office: 401-863-7266 ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/cg/. ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/cg/.
Current thread:
- Question re: inbound executable files Sadler, Connie (Dec 18)
- <Possible follow-ups>
- Re: Question re: inbound executable files Brian Reilly (Dec 18)
- Re: Question re: inbound executable files Craig W. Drake (Dec 18)
- Re: Question re: inbound executable files Dewitt Latimer (Dec 18)
- Re: Question re: inbound executable files Christian Grewell (Dec 18)
- Re: Question re: inbound executable files Gary Flynn (Dec 18)
- Re: Question re: inbound executable files Clyde Hoadley (Dec 18)
- Question re: inbound executable files ROBERT MYLES (Dec 18)
- Re: Question re: inbound executable files Tim Lane (Dec 18)
- Re: Question re: inbound executable files Cal Frye (Dec 19)