Viewing 15 posts - 466 through 480 (of 6,026 total)
If this user is to have only reader access going forward, then I would suggest changing the owner of the schema to someone else, like DBO.
ALTER AUTHORIZATION ON SCHEMA::schema_name TO...
August 2, 2019 at 1:26 pm
I guess the problem with users as it relates to security and deployments would be that: if a process is not simple, then they won't follow it. So the solution...
August 1, 2019 at 1:46 pm
Just out of curiosity, how does Microsoft inform someone they have been awarded MVP status?
July 30, 2019 at 1:30 pm
Back in the 1950s, it was predicted that mass produced frozen TV dinners would enable most Americans to purchase homes without kitchens and restaurants would be obsolete. While technically possible,...
July 22, 2019 at 3:03 pm
One design pattern is to separate the PII database from the operational database using a service oriented architecture and that PII database could even be hosted by a 3rd party...
July 17, 2019 at 4:03 pm
For a highly selective and sensitive database, something like AIDS patients or voter records, address should be protected. Not only can it be used in conjunction with other public databases...
July 17, 2019 at 1:51 pm
So, how is it possible that an employee (even an IT administrator) clicking on an executable attachment can somehow wipe out the bulk of the organization's databases, network file shares,...
July 16, 2019 at 2:32 pm
Steve, your final point about how the insurance industry can help stimulate the progress of enterprise IT security is a good one. It's essentially the same same concept as the...
July 16, 2019 at 2:16 pm
I know I'm not a Villain, but I'm not sure where I fall on the spectrum between Hero versus Anti-Hero.
https://writerswrite.co.za/heroes-and-anti-heroes-whats-the-difference/
How far I'm willing to go beyond the call of duty...
July 11, 2019 at 5:49 pm
SQL Server itself is a very stable and secure product. Unfortunately, it sits on top of Windows. When operations has WSUS auto scheduling Windows updates on a database server, I've...
July 10, 2019 at 6:34 pm
Fortunately, most of the major 3rd party applications in use today are hosted in the cloud by the vendor themselves, rather than the IT organization hosting them on-premises. Huge monolithic...
July 10, 2019 at 3:38 pm
The problem is that many organizations simply deploy a VCS solution and then put out the word that everybody should start using it. But it's not just another developer tool,...
July 8, 2019 at 1:35 pm
It wouldn't surprise me if the department staff improperly accessing DMV records were also selling the data to third parties like private investigators, skip tracers, and law firms. Cell phone...
July 3, 2019 at 5:02 pm
I doubt that this one specific female employee was an isolated target. The people doing this have probably been routinely accessing DMV records for hundreds or thousands of women over...
July 3, 2019 at 4:53 pm
If you have an IT organization where departments (ie: developers and DBAs) are physically or culturally isolated, then conflict is only temporary. What it becomes over time is a cold...
June 28, 2019 at 2:49 pm
Viewing 15 posts - 466 through 480 (of 6,026 total)