InvestorsHub Logo
Followers 47
Posts 4888
Boards Moderated 2
Alias Born 02/02/2001

Re: None

Tuesday, 08/25/2009 11:17:02 AM

Tuesday, August 25, 2009 11:17:02 AM

Post# of 41086
Ok, this is Whack;
Dude, I give the OK to dilute enough shares to hire a proofer!
***************************
ATLANTA, GA--(Marketwire - 08/25/09) - LIGATT Security International (Pinksheets:LGTT - News) CEO, Gregory Evans, has been saying for years that IT managers need to be fired because they are not computer security experts. Evans wants Presidents, CEOs, Mayors and other figures of authority to know that they cannot trust Information Technology (IT) Managers, Chief Technology Officers (CTO) or Chief Information Officers (CIO) to protect their client, business and personal information from being hacked. Research shows that IT personnel only report 17% of company hacking incidents to avoid revealing vulnerabilities and mistakes.

"IT, CTO and CIO mangers' jobs are to network computers and keep the company's network up and running. The most these managers do is set up a firewall and put the network up on the other side, thinking they have properly protected the company's vital information, only to find out that the later isn't true. When you take cyber crimes like the T.J. Maxx, Ross and Marshalls breach, with costs of over $300 million, it shows even the largest, most profitable companies, with the most educated IT, CTO and CIO personnel are still at risk of being attacked," says Evans.

When reviewing the ten costliest cyber crimes of all time, Yahoo!, eBay and Amazon all lost $1.2 billion in February of 2000 due to a Denial of Service, which shut these sites down for several hours. Flooding servers with paralyzing amounts of network data, hackers' programs brought Yahoo!, eBay and Amazon to a crawl and eventually crashed their systems. With research findings, such as the above statistic, being so startling, Presidents, CEOs and any other authority figures need to take a look at those they hire protect their company's most vital information.

"Most corporations are paying IT managers high six figure salaries to make sure situations like this don't happen. Big corporations have budgets of millions of dollars and have up to hundreds, or even thousands, of people working in their IT department, but yet people who haven't even finished high school, are able to hack in to these networks and steal information at the click of the button. Firms like Deliotte and Touche and Price Waterhouse Coopers have departments that deal specifically with IT security and have employees working for them who may be certified because they took a written test, but these people are not computer hackers, they are simply text book educated. In order for a company to protect themselves, they need to hire a true computer hacker; someone who literally knows everything about the vulnerabilities a network may have. This means companies are going to have to hire people who are either ex-computer hackers and have a firm with a clientele list or they are going to have to hire people who have worked for federal government agencies such as the National Security Agency (NSA) and the Central Intelligence Agency (CIA) who did nothing but computer hacking. If not, this is going to continue to happen time after time."

Evans states that anyone can walk into a bookstore, get a book on how to become a security expert, how to obtain a CISSP or CEH certification. Having at least two years experience of networking computers, virtually anyone can become certified, but that doesn't make them a computer security expert.

"The biggest problem occurs when IT managers have a security audit done. The manager may find out they have several holes in their network, but the problem comes in is when they don't report this to their boss. This is because their job is to make ensure there aren't any network loopholes and when somebody conducts an audit and finds out there are vulnerabilities, the IT Manager is not comfortable giving the results to their President or CEO in fear of losing their job," says Evans.

For a more detailed description and to see Evans' explanation of his opinions, view the video blog on www.ligatt.com.
***************************