Dave Cunningham, our Business Technology Officer, has
been doing some research on e-mail security and privacy for company
executives. In doing that research, he
came across an interesting article on a survey that points out that one in
three IT administrators say they
or one of their colleagues have used top-level admin passwords to pry into
confidential or sensitive information at their workplace.
The survey also points
out what IT workers would do when asked to select three things they would try
to take with them if they were told they would be fired the next day. The top
two vote-getters: customer database
(35%) and a list of all privileged passwords (31%).
In my 30 years of IT
management experience, that is right on the mark. Countless times I can cite situations where
outgoing employees have systematically stolen vital company data on the way
out. In other cases, we have worked to
try and recover data that was systematically deleted. In one case, the IT guy was the culprit. He was terminated and told to go to his desk
and gather up his personal items and be out at noon. Instead, he worked
systematically to first delete all of the backups, and then he moved on to the
servers and quickly deleted all the data before walking out the door. This is why a coordinated employee lock-out
procedure is so important when terminating an employee. Human Resources and your trusted IT resource
need to coordinate the termination of a problem employee. While HR is meeting with the employee to be
terminated, an inconspicuous signal needs to be sent to the pre-prepared
trusted IT resource to lock-out all accounts during the termination meeting.
Do you have any interesting
anecdotes or horror stories to share?
If so, please share it
with me at toli@alvaka.net or 949 428-5005.

You want to enter in a fully burdened labor rate for this field. What that means is that you want to take the base hourly rate, plus 25-30% for employer payroll taxes, benefits, vacation/holiday time, etc.
Smoke testing is a type of software testing performed by Alvaka after a software patching sequence to ensure that the system is working correctly and to identify any misconfigurations or conflicts within the patched system.
This is a basic cost calculator for you to compute your typical monthly cost for patching your servers, PCs, laptops, tablets and associated application software. It also forms the basis for you to begin calculating your Return on Investment for software patching, or for comparison with alternatives to the manual process of patching operating systems and application software—such as Patch Management as a Service, also known as Vulnerability Management as a Service.
Smoke testing is a term used to describe the testing process for servers after patches are applied.