Is this a Firefly reference?
Is this a Firefly reference?
Sir, this is a Wendy’s
No joke, I thought for a second you were referring to Infinite Solutions and were trolling hardcore. I haven’t thought about that in a long time.
Make sure you back up all email and IM communications and don’t rely exclusively on server-side retention (provided your DLP policy allows for this.)
If it ever comes down to it and you are facing the possibility of being the scapegoat for a security incident, your attorney can review the relevant policy and determine whether or not and when you can use these to demonstrate that you communicated your concerns to management and stakeholders.
Depending on who you reached out to and who was included, absence of a response to your various methods of communication can be used to establish acceptance of risk by leadership.
sungloc.utus
For me it’s not about the traffic, more the log spam.
Generally I’ll have :22 enabled internally, and anything non-standard is defined in ~/.ssh/config
and shared out so I don’t have to remember things.
He was white as a sheet