Charlotte Foust
cfoust at infostatsystems.com
Mon Apr 2 11:13:03 CDT 2007
>Tyrants and dictators do things like this to stay in power LOL Sounds like IT to me! Charlotte -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of Dan Waters Sent: Friday, March 30, 2007 7:41 PM To: 'Access Developers discussion and problem solving' Subject: Re: [AccessD] OT Friday but not funny Well, a company could set up some methodology where you have at least two groups in house whose job it is to spy on each other, and create situations for them to constantly distrust each other. Then fire someone once in a while and 'imply' it was for security reasons. Tyrants and dictators do things like this to stay in power. Maybe it'll work in IT too! Dan -----Original Message----- Subject: Re: [AccessD] OT Friday but not funny If I run short, I can make my own. :) But all seriousness aside, our paper's business section seems to cover them. Maybe they've got a techie on staff. San Diego is also very highly wired. So there's maybe more than average readership for this stuff. But I was wondering if it's possible to stop an inside job. If there is some way to ultimately secure the data. Rocky -----Original Message----- Subject: Re: [AccessD] OT Friday but not funny Hi Rocky: You definitely seem to have to line on all the latest major database errors. :-) Jim -----Original Message----- Subject: [AccessD] OT Friday but not funny From: http://www.signonsandiego.com/uniontrib/20070330/news_1b30tjx.html TJX data breach now called world's largest 45.7 million cards were compromised You can read the details yourself but this snip stood out: The TJX case would "probably serve as a case study for computer security and business students for years to come," said Beth Givens, director of the San Diego-based Privacy Rights Clearinghouse. "This one could be considered a worst-case scenario." One reason, Givens said, is because of TJX's disclosure late Wednesday that it believed the hacker or hackers "had access to the decryption tool for the encryption software utilized by TJX." Rocky -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com