Thread regarding ExxonMobil Corp. layoffs

Security Theatre

¿Do ExxonMobil Management Committee (MC) know when they block ExxonMobil from Microsoft Office 365 due to risks they were told about US FISC [Foreign Intelligence Surveillance Court] and subpoenas to Microsoft for ExxonMobil data,almost all ExxonMobil network packets already runs unencrypted? ¿Do they no realize NSA and Internet Service Providers can just packet sniff company network?

They be protective of company networking perimeter they neglect the inside. The people who present to the MC years ago know this and did not disclose this. AW DW KC and BM "Chief" jaja.

I left ExxonMobil a year ago. Still I have friends trapped there without good tools and are so frustrated. I tell you it is much better now.

¿What do they have to hide?

by
| 1925 views | | 8 replies (last )
Post ID: @OP+1eVbVKPz

8 replies (most recent on top)

@1jhm+1eVbVKPz If they track by IP, then intentionally changing up the language or spelling or anything won’t make a difference. If OP is that concerned about security, a VPN would be an option that worked to post more anonymously. Still traceable though if you really wanted to that badly.

Although OP doesn’t seem to know much about networking, so I don’t really trust any of this.

by
|
Post ID: @2vpr+1eVbVKPz

@uor Or maybe they’re intentionally fudging-up their written English to disguise who they are. It’s easier to narrow-down a poster’s identity from their writing style than many people realize, especially on a website that records IP addresses.

In general, O&G companies are behind the cybersecurity curve. This is especially true for US “super-majors.” The recent attack against the Colonial pipeline is but one example. Perversely, most companies (including Colonial, apparently) opt to pay the ransoms while doing little/nothing to permanently improve security for their digital infrastructure. In fact, most continue to outsource and downgrade their IT functions while performing critical business functions using legacy software/hardware.

by
|
Post ID: @1jhm+1eVbVKPz

The internet is evil. The internet is evil. The internet is evil.

We are sending everything to the internet. Cloud first!!!

by
|
Post ID: @hls+1eVbVKPz

I never do any Webcat modules and go straight to verification. I hope no one finds out.

by
|
Post ID: @asp+1eVbVKPz

But what may it does if not be care what you’ve want. Agreed?

by
|
Post ID: @mce+1eVbVKPz

Based on experience, this seems to be the patten at most big industry and players. Security theatre and propoganda. Insurance industry is part of the huge problem.

They will stout their security staff and pay them tons of salary and do PR about how security their company is and with the push to MS365 (Klaus Swab and Davos will be proud).

by
|
Post ID: @hel+1eVbVKPz

Another Bangalore post. Terrible English.

by
|
Post ID: @uor+1eVbVKPz

Wow, ballsy post. They will likely take more time to try to track you down than fix the problem, if this is true.

by
|
Post ID: @dvm+1eVbVKPz

Post a reply

: