Friday, March 24, 2006

Protection methods

It's interesting what type of tactics people play when protecting themselves from the threat on the internet. After speaking today about how hackers and criminals no longer attempt to jump through your perimeter defenses and they will target web app's and the people who are part of the system/network, amongst other things.
An attendee tells me they protect themselves from the outside threat by buying obscure firewalls and IDS that they think will not get the attention of the hackers!! Then the penny dropped>>!!

-Graeme

No comments: