No matter how tightly locked down one keeps one's internal systems, how religiously the system administrators apply patches, and how well educated about network threats the user base becomes, a weak perimeter security system turns an otherwise secure system into a castle with an empty moat.