• the ability to protect the entire system is dependent on the weakest link

    That needs to be underscored. No matter the system, there is a weakest link. Every network has a vulnerability. Hackers rely and prey on those weaknesses. Many of the weaknesses are easy enough to plug and reinforce - from a tech perspective. If the vulnerability is not plugged, what does that say about the people responsible for plugging those holes? They need a little training and exposure to the risk.

    Jason...AKA CirqueDeSQLeil
    _______________________________________________
    I have given a name to my pain...MCM SQL Server, MVP
    SQL RNNR
    Posting Performance Based Questions - Gail Shaw[/url]
    Learn Extended Events