Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

What could have been done differently?

  • From: Sean Donelan
  • Date: Tue Jan 28 03:12:18 2003


On Tue, 28 Jan 2003, The New York Times wrote:
> A spokesman for Microsoft, Rick Miller, confirmed that a
> number of the company's machines had gone unpatched, and
> that Microsoft Network services, like many others on the
> Internet, experienced a significant slowdown. "We, like the
> rest of the industry, struggle to get 100 percent
> compliance with our patch management," he said.

Many different companies were hit hard by the Slammer worm, some with
better than average reputations for security awareness.  They bought
finest firewalls, they had two-factor biometric locks on their data
centers, they installed anti-virus software, they paid for SAS70
audits by the premier auditors, they hired the best managed security
consulting firms.  Yet, they still were hit.

Its not as simple as don't use microsoft, because worms have hit other
popular platforms too.

Are there practical answers that actually work in the real world with
real users and real business needs?






Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.