Sounds like a two step process. 1. Download attachment xyz.txt from an e-mail from abc@company.com and place in \\dbserver\dtsinput directory, and 2. Once xyz.txt is found in the...
Are there users waiting on these jobs to complete at 8am? Maybe the overall goal is to get all of the jobs completed earlier. Perhaps the boss wants the job...
Encryption can help in mitigating risk. There is a question as to what type of breech database encryption (table, column, or entire DB) will prevent. If the back-up tapes are...