Securing your Partners survey

From: Russ Cooper (Russ.Cooper_at_TRUSECURE.CA)
Date: 02/28/05

  • Next message: Russ: "Re: Hidden Applications and rootkits for Windows"
    Date:         Mon, 28 Feb 2005 14:57:21 -0500

    Hash: SHA1

    Over the last decade, organizational boundaries have been extended
    through such trends as the rapid development of information and
    communication technologies and increasing pressure for partnering and
    outsourcing to remain competitive. During this transition, traditional
    layers of internal and external separation have been removed to foster
    enhanced communication and accessibility among business partners.

    Cybertrust is interested in your input on how the 'extended enterprise'
    has affected information risk in your organization and how your security
    practices are changing to meet these risks. A short survey (between 7
    and 21 questions) has been created and is accessible through this link:

    Once you have completed and submitted the survey, you will be able to
    view the results from all participants as often as you like over the
    next few weeks.

    Your participation is greatly appreciated,

    Russ Cooper
    Senior Scientist/NTBugtraq Editor
    Cybertrust, Inc.

    Version: PGP 8.1

    -----END PGP SIGNATURE-----

    NTBugtraq Editor's Note:
    Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.

  • Next message: Russ: "Re: Hidden Applications and rootkits for Windows"