The IT Department as Corporate Snoop? 116
coondoggie writes with a link to a NetworkWorld article about the dangers of IT department snoops. A study released today is likely to exacerbate the trend of failing trust in employees; it shows that one in three IT employees poke through systems and prod at confidential information while on the job. The survey was done by a firm specializing in password security, so some salt might be required for this particular article. "The survey found that more than one-third of IT professionals admit they could still access their company's network once they'd left their current job, with no one to stop them. More than 200 IT professionals participated in the survey with many revealing that although it wasn't corporate policy to allow IT workers to access systems after termination, still almost 25% of respondents knew of another IT staff member who still had access to sensitive networks even though they'd left the company long ago."
Only 1/3rd? (Score:4, Funny)
Never hire an IT guy who couldn't pass the BOFH test.
Re: (Score:1)
But I think the more notable lie/damned lie is that 1/3 can still access their previous company's network after termination. It seems like there'd be more important security implications with disgruntled fired IT guys still having unbridled access to the company network.
Re: (Score:3, Insightful)
Not all are fired/disgruntled. Some leave on good terms.
Re: (Score:2)
i have however had some managers who were pissed off i was leaving purely because i was leaving to make more money then them, and that i wouldn't be there to do their work all the time. that's their problem not mine though.
Re: (Score:2)
Well that makes me Occupationally Inferior (Score:1)
I wash dishes for a living.
- - - - - {sotto voce} - - - - -
It's okay, I'm still in tertiary education. Plenty of time for a long-term career in data-entry.
Re: (Score:1)
qz
Re: (Score:1)
Re: (Score:2, Funny)
The other 1/3... well... when I read their thoughts all that was coming through was "deny, deny, deny."
Re: (Score:2)
Pr0n?
[badum-ching]
Re: (Score:2)
Re: (Score:1)
Fixed that for you.
Lameness filter encountered. Post aborted!
Reason: Don't use so many caps. It's like YELLING.
Re: (Score:2)
This wouldn't happen at Slashdot's IT, would it? (Score:2)
Re:This wouldn't happen at Slashdot's IT, would it (Score:1)
me! (Score:1, Funny)
Re:me! (Score:4, Funny)
I guess Ill have to look at it when I get home.
Re: (Score:1)
Re: (Score:1)
Whoops.
Hmmm (Score:3, Interesting)
This is kind of funny, When the layoffs hit back in 2001 I know of lots of instances where this happened. They lay off the IT staff and expect the systems to magically run them selfs, or expect the janitor to be able to run it all.
But to see that today is a little of a surprise. Maybe they have not hired new IT staff and the equipment is just running on autopilot.
Re: (Score:1)
For all the remote sites that they supported? I have access to their servers still. I haven't logged in to them but I can connect to their session, an
All the more reason.... (Score:3, Funny)
Seperation of powers (Score:3, Informative)
default passwords (Score:5, Funny)
Some people are blockheads.
News at 11.
Re: (Score:2)
C//
Re: (Score:2)
So, anyone running a sniffer will see the username, but not the password... unless they're the same damn thing, of course.
Why? (Score:4, Funny)
Thinkgeek knows it too (Score:5, Funny)
They even sell the T-shirt. [thinkgeek.com]
Bad security, even without snooping (Score:5, Interesting)
The company has since been bought out and shut down, but that incident has always bugged me.
old work still accessable (Score:3, Interesting)
accessing old work system is true i think... i know i still have access to places i setup 7 years ago, i login once a year to look at the up time on the system. it's nothing more then me checking on how my creation is going, if i saw a problem i'd probably report it to my old boss with a suggested fix.
by the way, it's linux 2.4... 7 years up time on old salvaged hardware.
Re:old work still accessable (Score:4, Interesting)
Re: (Score:2)
Re: (Score:2)
er, it was lastest 2.4 version when i left. can't vouch for it right now though
I'll tell you what... we will wait while you check. (You did say that you still have access.)
Re: (Score:2)
the private files thing is total bullshit - we don't CARE abotu your dirty emails to your wife.
Maybe to you and me, but there are people out there that get off on that kind of thing.
:-/
There were legendary tales of an employee long ago that used to spend a big part of his/her time reading other people's emails. He/She was never reprimanded in any way (that I ever heard of anyway). The fact that his/her family was supposedly a holder of a LOT of stock probably had something to do with that.
I barely knew said employee, but from the few small interactions I had with him/her.. I believe the stories.
Re: (Score:2)
Re: (Score:3, Insightful)
As one IT pro to another... if your former boss doesn't know this, don't do it. There's a strong chance you'll cause far more trouble for yourself than you ever dreamed possible.
Who writes this stuff? (Score:1)
Re: (Score:1, Insightful)
These tokens don't magically fix broken IT security policies.
Re: (Score:3, Informative)
But these tokens do have a built-in expiration date, the server doesn'
Re: (Score:2, Informative)
Curiously, Microsoft AD has no such ability. Password policies are set domain wide and there are no exceptions for anyone even with a GPO, a well known limitation of AD.
Let me correct your statement. You have "never seen an AD deployment where a GPO's were making exceptions..."
Re: (Score:2)
Jason.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Interesting)
If you're an admin you would certainly have access to the RSA ACE server that allows this.
Re: (Score:1)
I believe that the account will still go dead when the original lost token goes to "expired" state. I've seen event messages to this effect in the audit trail. Not sure about the exact behavior in the latest release.
Depends on how the ACE/Server is configured. RSA has done a pretty good job with granular permissions (aka "task lists"
Re: (Score:1)
Shenanigans! (Score:3, Insightful)
I find that hard to believe.
Can't be called professional without ethics (Score:5, Interesting)
I can't imagine how anyone could consider themselves "professional" without professional standards of behavior to go along with it. Do professionals in all fields get tempted "by the dark side?" Oh yeah... we see it on the news every day.
But at a rate of 33% of IT professionals breeching company trust? That's pretty frightening... it's probably untrue.
Re: (Score:2)
But you know, for a long long time, "doctors" required no credentials and "dentists" were often the same people that cut your hair. Hell, even electricians have varying levels of certifications that are generally agreed upon. So for as long as people have been pushing for reliable IT credentials,
Re: (Score:2)
Re: (Score:1)
Whaoa there, cowboy. It is not our job to snoop. It is managements job to tell us when to snoop. Paper trail in email.
As an admin I don't snoop. I only do what management wants. I keep my systems running. This is my admin role.
I keep the servers up. I keep things rolling. I don't care about what it is I keep rolling. I just keep it going.
If management has issues then I deal wi
Re: (Score:2)
This seems to keep coming up lately... (Score:4, Insightful)
Your company should have a published policy regarding user privacy and IT, and all members of IT should abide by that policy at all times. (In our case, for files or email, we require the approval of the user themselves or of a department manager and human resources before we go off reading your stuff. We do reserve the right to monitor network traffic at any time, for any reason, but we also make sure your email access runs encrypted over the network...)
In any case, please encourage your local IT Professionals to behave like Professionals. How should they behave, you ask?
Like THIS [lopsa.org].
Anyone who doesn't lock the accounts of ex-root-access employees and change the shared passwords that they had access to is lazy and negligent, bordering on criminally negligent. That's just inexcuseable...
Re: (Score:1)
Just my $0.02
True enough (Score:3, Insightful)
Of course, for a few places around here, me still having access is a good thing. Seeing how they call me about once a week because they couldn't follow well laid out documentation on managing the system...but I digress.
Re: (Score:1)
On every job I have left that is it. I have never tried to log on.
Case closed. Move on.
Emailing the owner/manager of a flaw in the system? Not wise.
It is best to cut the cord and go away.
So you emailed the owner/manager you still had access?
Good luck in court.
qz
Re: (Score:2)
So you emailed the owner/manager you still had access?
Any decent forensic work will turn up that I still have access; From there it's a short hop into believing that I logged in and covered my tracks ( assuming for a moment that I didn't log in at all ). While I agree not logging in is a good idea, they're lack of diligence puts me at risk. Therefore, I chose the course that will provide me with the greatest level of information and legal protection.
It isn't perfect, but it serves.
Re: (Score:2)
A bit of CYA goes a long way.
Wot no exit procedures? (Score:3, Interesting)
More than any other reason, this is why your IT team should be well paid and why duties should be segregated.
Course there should be documented exit procedures for HR and IT when people leave.
Re:Wot no exit procedures? (Score:5, Informative)
More than any other reason, this is why your IT team should be well paid and why duties should be segregated.
And also "trustworthiness" really has to be high on your priority list of job-qualifications for IT people. I always tell people, if you can't trust your IT people, you're in trouble.
You might ask why. "Why can't you put security in place that prevents your IT people from accessing the information you don't want them to see?" Well, I'll answer that with another question: who will put that security in place? Inevitably, there will have to be people who put security in place, and whoever that is could leave back-doors for themselves. There will be people who maintain the systems and security, people with powerful logins and passwords, and those people can override your security.
And ultimately, there are accidents. At one company, we can a common spam database for the whole company (years ago). Every piece of spam went into the same place. While looking for false positives in order to see whether the filter needed adjusting, you'd see every e-mail that had a swear word in it. If someone wrote about "f*%king", it was in the spam filter. Every mention of "penis" went in the spam filter. A lot of it was spam, but there was plenty of employee e-mail going around, talking about things they probably didn't want anyone to see.
Also, there were plenty of times where someone invited me to look at their desktop or e-mail in order to help them with something. Like, "hey, can you help me find this e-mail I'm looking for?" I say "yeah," and the e-mail up on the screen is an e-mail about having an affair and an Excel file containing everyone's salaries. It happens!
My point is, even if your IT personnel are honest, they'll probably see sensitive information somehow, even if by accident. Trustworthiness is an important trait. My advice: If you're hiring IT people, it might be good to hire the person you'd feel most comfortable telling all your dirty secrets. If you're just another employee, keep any information on your work computer or pass information through your work systems unless you'd be comfortable with your IT people seeing it. If you must send information from work that you don't want your IT people to see, use a Gmail account, and don't leave your browser open while you're away from your computer.
Re: (Score:3, Funny)
Why, indian engineers we get on green cards, of course. After the job is done, we bury them alive within the datacenter.
We already used that trick on our pyramids.
See it all the time (Score:2)
A big one is emails. Got an administrative staff member moving to a new computer, one of the things that I have to do is move all his/her email settings to the new machine, and ensure that her mailbox (if it's POP3) and address book make it over. Even if it's something like an IMAP account, I still need to test that the username/password and settings are correct.
Generally in most cases I just catch a glimpse of the mail
Re: (Score:1)
I know it's late to comment on this discussion, but anyway
Just how do you measure trustworthiness?
I can discuss things like real vs effective UIDs with people. I can ask them the derivative of x^2. I can even ask them to estimate how many gas stations are in the state of Texas.
But are there reliable ways of measuring how tr
Re: (Score:2)
Well i guess that's why you have an interview rather than a standardized test. A good manager or HR person should be able to get some kind of a read on people, even if it's not always 100% correct. You know, you see their response to different sorts of questions, check whether they know as much as they claim, and check to see if their resume/cover letter is accurate. You talk to them and hopefully you'll have some sense.
However, I'm not really talking about how you tell people are trustworthy. That's m
Re: (Score:2)
And, a critical step that many places I've seen with "documented procedures" for all kinds of important thing seem to miss: those procedures need to be (1) communicated to those responsible for implementing them, and (2) actually followed consistently.
Document Requests (Score:2)
This one is thorny. I actually had a former boss accuse me of snooping through his e-mail after he asked me to look at his e-mail to figure out why he was getting so many spam messages (SpamAssassin was just out at the time and I was writing custom procmail rules for him).
Of course, this was before he turned into a complete ass,
IT people could go to jail (Score:2, Interesting)
Re: (Score:1, Interesting)
Not quite. The former employee was an executive at Air Canada and one of his perks (despite the fact he was leaving Air Canada - quite a golden parachute) was a very large number of free flights on Air Canada for a very long time.
To book his free flights, he was authorized and given access to an internal booking system at Air Canada.
To book his free flights, obviously the system
My solution... (Score:2)
Poor Statistics (Score:1)
almost 25% of respondents knew of another IT staff member who still had access to sensitive networks even though they'd left the company long ago.
That's absolutely meaningless, and including that as a 'result' means that the pollsters are either ignorant or deceptive.
I bet 95% of slashdot readers know a homosexual. What does that say about the frequency of homosexuality? Pretty much nothing. There's overlap (two responders thinking of the same person) and selection bias (25% know of one case of a t
Beyond the files (Score:2)
Curiousity herded the cat (Score:3, Insightful)
When I want to
Re: (Score:2)
For those doors where no key would ever be issued (electrical vaults, restricted building spaces) we would occasionally put a thin metal sheet over the part of the doorjam where the lock went in. Door looked locked from the outside, but actually wasn't. It usually kept the doors available for a while.
The ONE door
Having access after you leave (Score:1, Redundant)
Passwords (Score:3, Interesting)
I'm skeptical about the snooping (much as I bitch about admins, they're actually remarkably ethical about privacy given the access they have, IME) but that password thing sounds dead on. Whenever they give us the lecture about how keeping track of the login/password combos for 25 different accounts, each rotated every 60-90 days, with mandatory mixed case, numbers and punctuation is easy -- why all you do is make up a little story -- "Mary went to the store to buy milk" becomes h7^Y8U0bs# -- I always ask them for the story to their previous password to the office furniture request page. They splutter about how no, that's a security risk to part with one of their expired stories but I can see the Post-It with the root password in their minds, like I'm Professor Snape.
Re: (Score:3, Interesting)
I've always written down my new passwords until I memorize them. Then I burn the paper.
If you lose it while you're still memorizing it, you change it quickly :)
But you don't write down what it's for, either...
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Telegraph Operators (Score:5, Insightful)
ethics and sociopathy (Score:2)
Some people are just scum. There are too many of these people in any group.
Some people need rudimentary ethics education. These are the interesting ones.
It's hard to imagine that people just don't think about ethics, but from what I've seen, much of the problem is exactly that. I've seen people who act badly but later with a little education, they actually work hard to behave well. Working with High School students and junior IT staff I found them ethically naive (to be generous)
Maybe this explains Ameritrade spamming (Score:2)
It's called exploration. (Score:1, Insightful)
If you're in IT, and you're an administrator, the company must be able to trust you with ALL DATA! That means ALL FUCKING DATA, not what the top people just think you should or shouldn't be familiar with. If your company is shit and fucks people over daily, IT will know, and IT Will find another job and leave you with some shitty guy who can't even turn a machine on doing your work. Then you get targeted,
It's a problem (Score:5, Interesting)
I had a situation occur a few years ago in which I had to fire a trusted and valuable staff member for snooping through a senior manager's email. Another staff member actually detected this when he printed a copy of the email, and it came out of the printer in his home office even though he was on travel. This came to my attention very quickly, and we reviewed audit logs that we'd put in place earlier and found plenty of evidence of his snooping. It pained me to fire the guy--he was smart, ambitious, and held up really well under pressure. But in the end, I concluded that a slap on the wrist would just send the message to other team members that it was OK to cheat until caught for the first time. I suspect that it was the right move for him, too; our sudden, decisive response to his lapse in judgment doubtless made an impression.
So, some advice to IT managers: ensure that there's an audit trail for all privileged activity. You'll detect and stop abuse if it's going in, and will deter staffers from being tempted to misuse their rights.
Phil
Once upon a time (Score:2)
Salt for passwords too (Score:3, Funny)
Okay, that was a stretch.
Exit Procedures? (Score:1)
Its all fair (Score:1, Insightful)
Re: (Score:1)
Why...? (Score:3, Insightful)
> admit they could still access their company's network once
> they'd left their current job, with no one to stop them.
Does it seem that people are villainizing the IT guys that left?
Shouldn't the criticism be levied upon the IT guys who REMAIN?
And as for snooping, it's not the snooping that bugs me, but the disclosures that sometimes follow. I was really pissed off when my boss started publicly ripping on me for the quality of some code scraps he found in my documents folder.
I didn't mind that he looked -- I don't expect privacy on a corporate computer. But he used what he found in an attempt to humiliate me (which failed since the rest of the department knew that the code was something that I was reviewing from a new intern).
Oblig. Thompson hack (Score:1)
I guess a few of us may be a bit young to remember this one [acm.org].
This has happened too many times... (Score:2)
I agree with many of the people before me. I do not accept keys to client locations unless I am onsite more than a month. I do not accept domain administrator passwords, I ask for a unique admin account with delegated rights. And I do not snoop into files.
Just recently I went to my boss and told him that our ex-HR person's home directory was wide open. I pointed out to him his hire letter and more from my other collegues. I almost did not approach him about it for fear of repricussions. However, I di
Yes, but why? (Score:1)
> company's network once they'd left their current job
Did they say why, or was it a yes-or-no question?
If it were a yes-or-no question, stated along the lines of "If you left your job, would you subsequently still have the ability to access your employer's network?", then I would have to answer "yes", but this has nothing to do with my being a snoop and everything to do with my employer not having anyone
Corporate Snoop? Wearing a tie with cornrows? (Score:2, Funny)
User sheep (Score:1)
I only monitor specific user activity if they complain of performance problems.
oh duh (Score:1)
Cyber-Ark Software, a company that, naturally specializes in password protection.
Maybe they proved their point about access to the departments data. But they didn't prove to me that they accessed the data in order to commit harm to the business. There is maybe a slight number of ex employees that still have access that you probably need to worry about more. Those will be the ones, that would never admit to being able to access the data.
Cyber-Ark Software has a lot to gain by inflating the risk.
Unpatched holes (Score:1)
1. Close the vulnerability and stool me
2. Close the vulnerability and keep quiet (to keep management from panicking)
3. Leave it open and ignore it (unlikely)
4.
For a fast climb up the IT corporate ladder.... (Score:1)
In still fear by over promoting the risk.
Hire a aduiting firm to tell you what to do.
Install keyloggers on each workstation and create the corporation's largest database. Then implement a sexy program to find "bad thoughts"
Fire a few people and put the fear in your employees.
Who cares if it has nothing to do with the business...we at war.