Dave Cunningham, our Business Technology Officer, has
been doing some research on e-mail security and privacy for company
executives. In doing that research, he
came across an interesting article on a survey that points out that one in
three IT administrators say they
or one of their colleagues have used top-level admin passwords to pry into
confidential or sensitive information at their workplace.
The survey also points
out what IT workers would do when asked to select three things they would try
to take with them if they were told they would be fired the next day. The top
two vote-getters: customer database
(35%) and a list of all privileged passwords (31%).
In my 30 years of IT
management experience, that is right on the mark. Countless times I can cite situations where
outgoing employees have systematically stolen vital company data on the way
out. In other cases, we have worked to
try and recover data that was systematically deleted. In one case, the IT guy was the culprit. He was terminated and told to go to his desk
and gather up his personal items and be out at noon. Instead, he worked
systematically to first delete all of the backups, and then he moved on to the
servers and quickly deleted all the data before walking out the door. This is why a coordinated employee lock-out
procedure is so important when terminating an employee. Human Resources and your trusted IT resource
need to coordinate the termination of a problem employee. While HR is meeting with the employee to be
terminated, an inconspicuous signal needs to be sent to the pre-prepared
trusted IT resource to lock-out all accounts during the termination meeting.
Do you have any interesting
anecdotes or horror stories to share?
If so, please share it
with me at email@example.com or 949 428-5005.