Avatar feed
Responses: 5
SFC Joe S. Davis Jr., MSM, DSL
3
3
0
SSgt GG-15 RET Jim Lint great read/share of the most informative. Well received and much appreciated.
(3)
Comment
(0)
Avatar small
Capt Brandon Charters
2
2
0
SSgt GG-15 RET Jim Lint - You're my new favorite follow on RP. "Any system, building or company can be penetrated. No set of security measures will completely protect against determined cyber hackers." There is so much uncharted territory here that it makes defining rules a real challenge. Regulation will have a hard time keeping up with the pace in innovation. SSG James J. Palmer IV aka "JP4" and SGT (Join to see) should enjoy this read.
(2)
Comment
(0)
SGT Writer
SGT (Join to see)
>1 y
I read and shared.
(1)
Reply
(0)
Avatar small
Lt Col John (Jack) Christensen
2
2
0
Good article and I agree. For probably as long as there have been computers senior management has been largely ignorant of what it takes to keep a computer/network running. They care only for what the computer provides, not what it takes to get that product in their hands. The IT folks, for any number of reasons, have been content to keep superiors largely in the dark and when there are issues they get passed off as computer glitches. IMO as cyber security has become more of an issue and senior management has become more computer savy the need to hold IT responsible for security breaches falls directly in the IT lap. The security guard example in the article is a good one, when security issues arise in a company the performance of the guard is the first thing looked at. When computer security issues arise the performance of IT team should also be the first thing looked at. In either case if termination is called for that action should be taken.
(2)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close