10% of IT Pros Can Access Previous Jobs' Accounts 218
dinscott writes "According to a survey that examines how IT professionals and employees view the use of policies and technologies to manage and protect users' electronic identities, the sharing of work log-ins and passwords between co-workers is a regular occurrence. It's no wonder then that half of them are concerned about insider threats to network security in their company's current infrastructure! But one of the most surprising results shows that one in 10 IT professionals admit they have accounts from previous jobs, from which they can still access systems even though they've left the organization."
well, i can (Score:4, Interesting)
but is it my responsibility to suggest they change the password? especially since a 'professional' it outsourcing company took it over?
Re: (Score:3)
Re: (Score:2)
i am a professional, and i understood that they thought i was overpaid (especially since after i was there for 2 years, there were hardly any network issues). i don't wish them harm, but i would like to at least hire a competent IT outsourcing company to replace me, so I know my 2 years of work ended up in good hands... :)
Re: (Score:2)
No, no, no. It's like paying for insurance...
I only buy insurance policies the day before I intend to get in an accident, decide to get robbed, elect to have my house destroyed by a tornado, etc.
It is much more cost-effective that way.
Re: (Score:3)
(especially since after i was there for 2 years, there were hardly any network issues)
Surely that can only mean you were doing your job well.
Unfortunately, this is not the way of user psychology...
By default, all complex network setups work perfectly(It said "enterprise" right on the box, dinn'it?). If yours does not work perfectly, that is because your IT department is incompetent. If yours does work perfectly, this implies that your IT department is slacking off and playing video games, and should probably be fired and replaced by something cheaper.
Re: (Score:2)
Surely that can only mean you were doing your job well.
That's one reason I've always liked IT / infrastructure administration. The better you do your job, the less work you have to do. :) The other reason is that it's one of the few tech jobs that scales well without pushing you out of tech and into management. (Compare with programming, mechanical / civil / electrical engineering, and any other X where you can only be promoted a couple of times from 'junior X' to 'X analyst' to 'senior X' before you get promoted to 'lead X' which is really 'X manager'.)
Then
Re:well, i can (Score:4, Insightful)
This. If you are good at the IT job, your work is invisible. However, one needs to make sure they are not invisible, mainly by proactively checking with other cow-orkers and departments to see how things are running, anything possible they can get, etc. This way, you have a presence.
I have seen companies fire their IT guys who have extreme clues because they thought that they could get someone cheaper to run things, then their whole infrastructure collapses with the guys they hired on to replace the veteran IT people barely able to do firefighting duties. Said companies end up with two choices, either finding another veteran IT person that they likely will end up paying far more, re-hiring the guy they fired (assuming he or she would ever bother to come back), or re-hiring the fired person as a consultant for a lot of cash.
Here is the ironic thing: The PHB who has the MBA goes through courses like ITIL/ITSM concepts where they have to pass concepts like this. So, the concept assuming that the IT infrastructure would work perfectly by jettisoning veterans was taught to them that it won't work.
I do NOT have a hard time (Score:5, Insightful)
I know I still got access because they called me from a previous job if I could help them out and I just tried my login during the call to see what was going on and it was still there. I just thought "oh", fixed the issue and mailed that I still had access and left it at that.
I am a pro but not a sys admin. If I do not work for them, I do not have a need to access their servers and so I don't. Not very hard. Disgruntled? Even then I wouldn't because it would be against the law and could seriously hurt future employment.
The trick therefor for companies is to both have good account management AND hire professionals who care about not becoming a criminal.
Seriously kid, to anyone who read this, you just gave a massive reason NOT to hire you.
Do I as an employer constantly have to worry if it is that time of month for you?
Re: (Score:3)
Years ago, I repaired photocopiers. Once I just stopped at an account for periodic maintenance because I had nothing else to do. First thing I did was hit the copy button for a test copy, and the scanner lamp blew. I didn't have any lamps fo
Re: (Score:3, Insightful)
Do I as an employer constantly have to worry if it is that time of month for you?
If you as an employer had the forethought (they rarely do) to worry about that, then they would have changed the login credentials already.
I don't feel the need to baby my ex-employers through their incompetence. I'm not going to do anything with the information, but when you let me go, my obligation to the company ends there. It should be standard operating procedure when you let someone in IT go who has privileged login credentials, that you revoke those credentials.
Re: (Score:2)
>The trick therefor for companies is to both have good account management AND hire professionals who care about not becoming a criminal.
I found myself on the receiving end of the recession a year ago, having to suddenly tune my interviewing skills again. I still think one of my best selling points was being able to answer the "Why should we hire you?" question with this:
"My position was eliminated and I was given a 90 day notice by my previous employer. At which point I was allowed to work through the
Re: (Score:2)
And this is why you are likely unemployed. If not, you probably should be. As an employer, if I found out you made a comment like this recently anywhere during the due diligence that is our hiring process, your application would immediately be round-filed.
The *only* thing you really have is your honor, because when that's gone, you're toast. Ask security consultant firm HBGary Federal how they're doing now that their lax security has been exposed. [arstechnica.com]
As a technology consultant myself, I frequently review articl
Re:well, i can (Score:5, Insightful)
> but is it my responsibility to suggest they change the password?
You should do so for your own protection. Do it in writing. Don't check to see if the password has been changed, however: you could be accused of "breaking in". Just send them a letter reminding them to make the change.
> especially since a 'professional' it outsourcing company took it over?
Which may look around for a scapegoat after they screw up. You really don't want them to discover that a break-in occured via an account for which you, a "disgruntled former employee", had a password.
Re: (Score:3, Insightful)
Sure I do. I didn't do it, so they can't prove I did. And I get to rub it in their faces- "You fired me, a competent employee, and hired some losers who can't even change a password. What idiots!!".
The best thing to do in such circumstances is probably to just let yourself forget what your old password is. Providing you were smart, it is a strong password, and difficult to remember, it will be forgotten eventually.
Just don't try to remember it or use any new password similar to it.
Re:well, i can (Score:4, Informative)
Sure I do. I didn't do it, so they can't prove I did. And I get to rub it in their faces- "You fired me, a competent employee, and hired some losers who can't even change a password. What idiots!!".
What makes you think they can't prove you did it just because you didn't do it? Do you really think no innocent man has ever been convicted of a crime they did not commit? Even if you can ultimately prove it in court, it could cause you quite a bit of inconvenience in the meantime -- the company just needs their forensics "expert" to convince the cops and a judge that you did it and they'll come take all of your computing equipment from your house.
Wouldn't you want to be able to give your defense attorney the letter you sent to your former boss that gives step by step instructions for making sure all of your points of entry into their network have been closed. If the company is as incompentent as you suspect, you should do everything you can to protect yourself in case they get breached.
Even when my company was bought by idiots (who ran it into the ground within months), on my last day I sat down with the new Network Admin and my former boss and we went through the letter to make sure all of the network/admin passwords were changed and the firewall "backdoor" into the DMZ from my home IP address was removed.
Re:well, i can (Score:5, Interesting)
With clued people, there may not be convincing evidence.
However, in a jury trial with the DA throwing the book at you for a lot of computer trespass charges, convincing a jury of that is a lot harder.
We all have dealt with the Joe Sixpack archetype. He calls you on the phone demanding you "fix" his computer. Because he is either a friend of someone you care about, or otherwise can't tell him where to stick it, you go over. You make it past the baying mangy hound menagerie, avoid the cans of Bud Light on the front porch, hold your breath as you round the TV area that is permanently turned onto Fox News, and narrowly dodge the gun cleaner oil perched precariously on a table.
Finally you get to his computer. The copy of AV software has expired (or never been activated.) You see the hard disk light constantly on even though the box is idle. Further prodding finds that a reinstall is a must because iexplorer.exe and explorer.exe got corrupted and replaced by something. The recovery partition? Completely corrupted.
You ask Joe for the install media. He never made the install CDs (if he bought the box from most PC companies), or he lost the media (if he bought a Dell). You ask him about backups. He tells you that if he backs his pickup up any more, it will smash into the wall. You ask him about saved images of Windows. He wonders why you want pictures of stuff found in a Pella or Andersen catalog.
End result is that you tell him to buy some install media. He ends up stopping by Best Buy and just buying another computer. You help him get the new machine set up and browsing the NSFW stuff (the computer's primary use), and almost certainly, the cycle will begin again in a few months.
Now picture twelve of these types of people who have zero clue about computers. They are deciding your fate, and they have possibly the rest of your life in their pork-rind stained hands. The DA will tell them in the opening/closing statement that you trespassed electronically, and the jury will just rubber stamp that verdict and the sentence time asked, because they don't know better. They will dismiss the defense as greasy nerds with "ass-burgers syndrome" who are trying to spout meaningless technobabble in order to get a disgruntled employee off the hook.
It just pays not to log in at all, whatsoever to an ex-employer without permission. It also pays to use a strong password, so you are not kept up at night wondering if a cracker would get in and get you blamed for it.
Re: (Score:2)
Why are these people trying their old accounts? What legitimate reason could they have (beyond being rehired or working as a consultant for their old employer)? I quit a long term job over a year ago, I'm pretty sure some of the public facing accounts I
Re: (Score:2)
My previous employer had a crapload of generic admin logins on the network.
My last responsibility when I left was to disable my own account, so I'd assume that my personal username and password would no longer work.
But I'd be very surprised if they bothered to change all those generic admin logins... I met a ton of resistance when I tried doing it while I was there.
Re: (Score:2)
Generic admin accounts are bad security policy, and bad change control policy. You were right to try to get them to change
Sometimes these accounts are unavoidable, though, since certain vendors support only root access plus remote AAA, with no local user database capability. Unfortunately, centralized authentication is itself a security/stability problem (DoS) when you are dealing with systems that can get isolated from the AAA server or AAA server setups that are not sufficiently redundant.
So pretty much
Re: (Score:2)
AAA? What on earth does that mean?
http://en.wikipedia.org/wiki/AAA_protocol [wikipedia.org]
Kind of surprised you're asking that here on Slashdot...
Re: (Score:3)
On another note, I used to work for a hosting company, and they gave us an employee account. My login still works for it, seven long years after I left there. Seven. I don't host anything out of it - I just use it for testing purposes from a remote location not associated with my local ISP.
I haven't logged into it in about a year, for fears arising w
Re: (Score:2)
When an administrator leave we explicitly leave their root access still on, that way, admins are not likely to build security flaws in the system.
And no, our admins are not just some guy we picked up from the streets because he knew how to release the caps lock key.
Re: (Score:2)
Re:well, i can (Score:4, Insightful)
Seriously. Unless you are rehired, never touch your old accounts again, no matter how well intentioned. The law is over the top on punishing evil hackers. Even if the risks seem low, the law makes it so not worth helping out should things turn sour. The least you should have is decent compensation for the risks you're taking, and to help allay suspicions of whether you could have ulterior motives.
My last employer wanted me to continue to help out after the money ran out. So I was to keep right on doing what I had been doing, with no contract, and no pay? No way!
Re:well, i can (Score:4, Interesting)
It's certainly your responsibility to never try that password. I left an IT job at a financial institution rather abruptly a couple of years ago after a blow-up with my boss over whether I was responsible for failures in a process that she'd explicitly delegated to another group. (Just the last in a long line of ex post facto policy and procedure changes) Anyway, I never had reason to try (nor would I, given the legal and moral aspects), but for a while I suspected they'd probably disabled my accounts but missed things like router passwords, voicemail passwords, etc. that were either too obscure or too difficult to change. Later, I spoke to a former coworker and found out that they spent untold sums of money on security audits and consulting after I left. Turns out, the best way to secure an organization is to talk doom and gloom, "nothing can save us" security for a while and then leave pissed-off and shouting.
As you might expect, once all those unfamiliar hands got into the shop, uptime went to crap. (Not good when you're dealing with other people's money) So, while I did nothing and probably didn't have any access anyway, the results for them were much the same - large cleanup bill and lost customer confidence. A moral of the story might be that while documentation, procedure, and security are all vital parts of IT, they can't substitute for a good management relationship with a competent, loyal staff. This is particularly true for organizations with IT shops on the smaller side of the staffing scale.
Re: (Score:2)
Re: (Score:2)
You can remind them that the password should have been changed without implying that you know that it hasn't.
Re:well, i can (Score:4, Interesting)
It's all in how you phrase it.
"Please change the bob.admin account's password, as it appears to not have been changed" : BAD.
"Hey Cyril, I just wanted to follow up and make sure that the new IT guys at XYZ.inc got all of my old accounts locked down. I expect they already changed the password on my old bob.admin account and disabled its permissions, but I want to make sure they also locked down the bob.vpn account and removed the firewall exceptions that we'd installed when I needed to fix the webserver that one time on my vacation." : LESS BAD.
The latter doesn't imply that you tried to access it, but rather that you're trying to make sure that the new IT people know about all of your accounts, not just the obvious one. The IT guys will say, "Oh yeah of course we did that ... " and then go fix it quietly if they didn't.
I'd better not be able to... (Score:5, Interesting)
My last action in my previous sysadmin job was to disable my own old accounts. If I find that they're accessible to me again, it means that:
Re: (Score:2)
They broke the servers badly, and had to restore everything from the backup I made before I left, and then were too stupid to re-do the list of admin tasks afterwards, which included disabling the accounts of three other former employees, one of which was fired for dirty dealings.
I find this scenario plausible. You should check if you can access the accounts.
Re:I'd better not be able to... (Score:5, Insightful)
I hate when people don't actually tell me that an employee has left. Last week someone was like "did you know that Elaine is back already?" and I was suprised to hear that she'd even left. Sure, come to me when you need a new account, but if someone leaves nobody says a thing. In fact I'm going to email our new HR dept right now, it should be part of the procedure when people leave..
Re: (Score:2)
I saw a lot of that at one job, though I can't blame HR or management. I know IT was being CC'd on firings/layoffs/etc, they just never did anything about it.
One employee quit to pursue a college degree. When he returned three years later, his uid/pass still worked. Another, a friend of mine, supplied me with his user/pass on the way to retirement; It worked five years later, and probably still works now, ten years on.
Re: (Score:3)
Dont bother, unless of course they call you up for 5x the money, to fix things... then your a 'consultant'
I disagree. When you leave, harp and leave a paper trail asking for them to lock your account (if you didn't have access to do so). When you come back, tell them "Please give me a login and credentials to access this." You're not even asking for your old account, in that case.
Re:I'd better not be able to... (Score:5, Insightful)
Re: (Score:2)
Re: (Score:3)
It enabled a clean break, and ensured I'd be disturbed as little as possible by the next guy asking what's what.
Re:keep important documents on a floppy disk (Score:2)
The crazy thing is that they were so hung up on security on everything else that some of the upper management would keep important documents on a floppy disk in the filing cabinet because "It can't be stolen if it isn't online"!
That's funny. I've seen dozens of instances of floppy discs becoming unreadable. The best is when it's towards the end of a 23 or so disc MS Office install.
Re: (Score:2)
My last responsibility when I left my previous job was to disable my own account. I suppose I could have left it for the next guy to do... It isn't like they were going to fire me or anything... But I wasn't actually done being the administrator there until I walked out the door, and a good admin disables accounts that aren't in use. So, I shut down my access. Disabled the account, set an auto-reply on the mailbox and forwarded mail to the new guy. Moved some important documents from my account to his
Re: (Score:3)
Trust has everything to do with it. Why would you give anyone root access if you didn't trust them?
All human relationships come down to trust at some point or another. If you don't recognized that, you're in for a world of hurt in the business world.
Re: (Score:3)
I agree to a certain point, but you'd still better be able to provide an audit trail of every system accessed by any given user at any given time. I'm sure there's a statistic out there of companies who are ripped off by supposedly trust-worthy employees. It happens every day and the competent IT manager has to make sure measures are in place to keep it from happening, or at least reduce the risk to a low factor.
I think it's great that you are able to trust people not to rip you off and I agree, most of the
Not surprised (Score:2)
I have a memory that absorbs passwords. I know that two years down the track after I left one company they called me asking for the Directory Services Restore Mode password. This was all well documented when I left. From this same incident I also know that the Admin passwords and the remote connection were all still using the same settings as when I worked there.
Not surprised in the slightest.
/. News Networks (Score:2)
Today's top news is that network security isn't - administrators do not audit accounts or access to ensure that only authorized people can access the company's equipment.
In other news, HB Gary is in the market for new network admins and security tools.
Audits needed (Score:2)
Re:Audits needed (Score:5, Insightful)
I'm with you right up til you start talking about mandatory password changes. Research has pretty well proved by now that making people change their passwords regularly means they write them down. A written down password provides a worthless level of protection from from almost every attempt to get into a system. Statistically a person with a secure password they can remember is far more secure then any number of new passwords they cannot.
Re: (Score:3)
In a physically secure environment, though, if you are concerned primarily with i
Re: (Score:2)
Re: (Score:2)
One thing a password expiry policy does do is provide some defense in depth when other measures fail.
Suppose its a smallish company, two or three IT people two or three HR folks. Normally when someone is hired, fired, or resigns HR sends the info over to IT ticking system; thats the prodedure. Now opps something unusal happens, a contractor for some other department needs an account. Jill in HR asks Harry in IT what to do about it because they don't have a process for this. Harry says no big deal Jill I
Re: (Score:3)
Wrong. 99% of attacks will come from out on the internet somewhere. Having your password written down does not make these any more dangerous. Having a good password written down is far more secure than having a memorable password that you never change.
Re: (Score:2)
Also, imposing password regulations severely reduces the amount of legal passwords, to the point that it makes rainbow tables more viable.
A full rainbow table of 1-12 characters? I can't fit that. But when you say "minimum six characters, at least two upper case letters, at least two lower case letters, and at least two symbols, and no character repeated more than once", I suddenly can.
And, of course, rigorous requirements causes employees to rotate between a fixed list of passwords, written down in all t
Re: (Score:2)
True, but it also enforces that Frank in Accounting doesn't simply pick "frank" as his password. Which would happen a lot more than you think.
Perhaps it would be an idea to test people when employing them. I'm not sure I would want Frank to keep my money secure if this is how little he cares about keeping access secure.
Still, one of the biggest problem I face in my daily work as sysadmin isn't users, but Windows admins religiously believing in a model where account=person and authentication=authorization.
It's probably only trumped by the problem people being susceptible to social engineering, trusting based on a perceived "who", and not "what".
Re: (Score:3)
Sometimes the goal is not actually security. The goal is to comply with some regulation (PCI, HIPAA, etc.) whose authors did not understand security, but thought that monthly password changes, a 12-character minimum length, and no reuse for the last seven passwords in the history; makes for some fine theatre. Also, substitute "regulation" with "C-level exec" and you get a similar situation.
Yes, I actually worked at a company once that had that password policy.
Re: (Score:3)
A post-it note kept in ones wallet? Secure
When I need to do something like this, I use a several character cookie that resides in different positions of the passwords. The cookie is a placeholder for an additional sequence of characters - remove cookie and insert sequence (character count of cookie and sequence should not match). I never write the cookie down. When I need to use the password, I look it up on the slip in my wallet and then mentally replace the cookie with the actual sequence of characters. This allows for strong passwords unique
Re: (Score:2)
Only 1 in 10? (Score:2)
I suspect it's higher. People quit because they're dissatisfied, and they have options. Which means that those who stay behind are generally those who have fewer options, and now even more work. How likely are they going to be even thinking about changing passwords?
Just this morning I got another set of
Re:Only 1 in 10? (Score:5, Insightful)
People often leave on good terms and the accounts are kept so the ex-employees can help out later here and there if asked.
Re: (Score:3)
This was one of our IT assistant director's ideas. I was uncomfortable about it from moment 1, but I did as asked. Someone about a year later looked at me like I was crazy when I said that that's what happened and told me to disable the account immediately.
I don't know why I'd want a former employee logging in, ever.
Re: (Score:2)
Besides... it's quite trivial to reactivate the account if you ever do want to bring them back as a consultant. Or create a new account.
Did you point that out to the IT AD when he came up with that hare-brained idea?
Re: (Score:2)
Re:Only 1 in 10? (Score:4, Insightful)
Lat place I worked (may it rot in Hell) I hired a junior admin (whom I like, and now feel really bad for accidentally screwing that way) whose previous company did that. It was a small organization and they'd only had him and another guy in IT. Every so often they'd pass him a few bills to login and fix something. Worked out well all around, he made a few extra bucks and they didn't have to do a panicked job search to replace him instantly. Definitely a terrible idea from a strict IA perspective, but it was a family owned company and they liked and trusted him (with good reason, he was a likable, trust-able guy).
Re: (Score:2)
keeping the accounts, sure, but at the very fricking least reset the password so the account isnt directly usable by anyone
As for good terms and leaving, i am currently sitting out my last days at the current job, and i'm not in a fight with anyone, but if they call me up next month asking for my help, they better be prepared to pay me ten times what they are paying now before i even lift a finger. Even when leaving on good terms people have very good reasons to leave their job.
Re: (Score:2)
In my experience, accounts are often kept because the people with the technical means to do the clean-up job are seldom notified in a timely manner when someone leaves. And when they are notified, the list of auths and auths to be disabled is quite often incomplete or incorrect. .ssh/authorized_keys on all accounts on all machines daily for unauthorized updates? Probably.
Did I know that the former employee had created an account on a customer machine out in the field? Nope.
Should I check all
Re:Only 1 in 10? (Score:5, Insightful)
People often leave on good terms and the accounts are kept so the ex-employees can help out later here and there if asked.
At my current job, I've replaced a guy who accomplished a hell of a lot in the two years that he was here. There's a good chunk of stuff here that my boss doesn't really feel comfortable with. So he disabled my predecessor's account, instead of straight-up deleting it, in case we had to call him in for help (at which point he would have been paid as an independent contractor).
But that account is disabled. Even though it's still got the same credentials on it, and could be re-activated and used in an emergency, it doesn't currently work. My predecessor could not log in right now if he wanted to.
You'd have to be crazy to intentionally leave an account active and functioning after someone leaves the company.
wtf? (Score:2)
If people are using passwords to log in remotely, your IT infrastructure is already broken.
Re: (Score:2)
It doesn't have to be remote; I've working in places with 10's or 100's of physical sites where a lot of the time the old "I'm from IT, can I use one of your machines for a few minutes" is sufficient to get access.
Re:wtf? (Score:4, Insightful)
social engineering is so very simple, and so very effective, true.
Google a mid-sized company enough to know the name, position and email-adress of an employee, and the name of one of his/her supervisors.
"Hi, it's from [network-provider] - I got a report that you where having some trouble accessing your email, [name-of-supervisor] couldn't get at his at all today - do you have a minute to perform some tests on your account ?"
People will gladly tell you their passwords, if it appears you know what you're doing and you know even a *tiny* bit about their environment, enough to make you seem legit.
It's not hard.
Re: (Score:3)
A key is a password too.
Just because the machine types in "ssh-dss AAAAB3N...uxIOH1" for you doesn't make it inherently more secure. If not properly managed, it's less secure, because it goes from "something you know" to "something anyone who gained access knows".
Re: (Score:3)
Or exactly the same security as a password that is stored in Desktop/passwords.txt, anyway.
That's why I stor my passwords in a text file named PamAnderson.mpeg.
NO ONE ever even askes about it.
This is telling (Score:3)
Even though that's the case (and I'm actually surprised the number isn't higher, considering my own experiences), the real revealing thing about this is that the VAST majority of IT professionals are professional enough not to take advantage of this or to retaliate against former employers. With the exception of a few high profile cases [infoworld.com], almost all IT workers do not use these backdoors for sabotage, theft, etc.
Re: (Score:2)
Why limit this to IT? The vast majority of workers can be trusted to do their jobs to the best of their knowledge. Only very few people actually try to do damage.
Of course, that percentage grows exponentially the more you abuse your people.
Re: (Score:2)
Considering the abuse that most IT workers take from their companies and bosses, I'm again surprised. ;-)
Re: (Score:3)
With the exception of a few high profile cases [infoworld.com], almost all IT workers do not use these backdoors for sabotage, theft, etc.
I think you don't quite have all of your facts straight about Terry Childs. He didn't use it for sabotage/theft nor did he use a backdoor.
Please, go inform yourself before posting again.
To lend a hand when needed. (Score:2)
When you work in the trenches with a tight-knit group of geeks sometimes it makes sense to leave a key under the mat. I have only once used my still-active credentials, and it was to shell in from home to help a former coworker in a pinch, at his request. He was half-way driving from one location in the middle of nowhere to another, a good 30 minutes from the nearest network connectivity, so he used his cell to call me and ask me to run an urgent but simple sysadmin task for him. No problem. Part of the
Re: (Score:2)
That's not what he said. the real revealing thing about this is that the VAST majority of IT professionals are professional enough not to take advantage.
He was surprised at the number of logins left open, not that people didn't use them in malicious ways.
Re: (Score:2)
given what some corporations/bosses pull which ends up with people quiting their jobs, yes
Re: (Score:2)
Considering the numbers we're talking here, it's more accurate to say that almost *no one* is a vindictive jerk. And yes, that does surprise me. If a significant number of IT people are using these backdoors for nastiness they're either covering their tracks very well, or the companies are keeping quiet about it (both possibilities, I suppose).
Re: (Score:2)
Not surprised at all (Score:2)
So easy to retaliate, but didn't (Score:4, Funny)
I have a customer who stiffed me a few hundred bucks for sysadmin work, and he has yet to change his passwords. I doubt he even knows how. I ran across one of them a while ago and sure enough it logged me right in to the account for his colo provider. I did nothing. In fact I even notified him that he should change his password and "oh you still owe me" and never heard a word.
"Hello, my name is Inigo Montoya. You stiffed me money. Prepare to be Pwned!"
Not too shocking (Score:2)
I'm not that surprised by this. I still have access to the network from one of my previous jobs, but it's because they specifically wanted me to still have access in case they wanted help. At another job, it took a while for my account to be disabled because I was the guy who would have normally disabled accounts. I had assumed my boss would disable my accounts when he left, but it took him a while.
It really wasn't that big of a deal, though. I left under amicable terms, and even if I hadn't, I'm a pr
This just in... (Score:2)
10+% of IT "Pros" aren't really that professional if they're going back to their old accounts to see if they can get in.
The computers of companies where I used to work are beyond the event horizon. I would never even try to log into them without some kind of written request for my former employer.
Re: (Score:2)
10+% of IT "Pros" aren't really that professional if they're going back to their old accounts to see if they can get in.
The computers of companies where I used to work are beyond the event horizon. I would never even try to log into them without some kind of written request for my former employer.
Yup.
I wasn't that impressed with my replacement at my previous employer. I wouldn't be surprised to find out that he hadn't changed the domain credentials. I wouldn't be surprised to find out I could still log in to their network.
But I haven't tried. And I'm not going to. And I wouldn't even with a written request (screw them).
I'm more surprised that there are that many IT "Pros" out there who have actually tried to log in to a previous employer's systems. Not terribly professional, in my opinion...
Re:Not terribly professional (Score:2)
Re: (Score:2)
I wouldn't be surprised if that 10% is more a theoretical number of "could" log in if necessary than "did" log in. I think it shows how trustworthy IT professionals are as a group.
In which case, I'm wondering why they think they can, if they didn't try it?
Are they just assuming that their replacement is incompetent? Did they intentionally leave a back door that they assume is still there?
I wasn't much impressed with my replacement at my previous job. I wouldn't be surprised if some of the admin accounts haven't been changed. I wouldn't be surprised if I was able get in to my old employer's network. But I don't know that I actually can. And I certainly wouldn't have answered in t
Re:intentionally leave a back door (Score:2)
Re: (Score:2)
But I haven't tried. And I'm not going to. And I wouldn't even with a written request (screw them).
Well, the request has to be written in the memo field of a check paying me for my time.
Client resistance to security efforts (Score:4, Interesting)
Last year I actually lost a client for being too security conscious. They were a part-time client and only usually called me when it was an absolute emergency...most of the time when a problem happened they would try and fix it themselves, make it worse then call me. I tried to talk them into letting me come in once a month to patch and update on a scheduled basis. I was told I was trying to fleece them and pad my hours and that they felt they needed to take IT in another direction.
Nearly a year later I am still receiving backup notices, a few ,months back I found out accidentally that the root password hadn't changed when I ran a maintenance script that I used to do a resources audit, forgot to change the account info to a different client. I called them right away and instead of "thanks we will take care of it" I was told that I was hacking and that if I didn't stop they would report it to the police. I even tried talking to their new IT guy (one of the owners nephews) but he told me he was not allowed to speak to me and hung up.
I'm actually worried about the former client but am completely at my wits end about what I can do about it and frankly i'm worried that when the inevitable happens the first person they will attempt to blame for any disaster is going to be me. For now all I have been able to do is document my efforts to get them to fix the issue.
Re: (Score:2)
Re: (Score:2)
It also might not hurt to print out the same info and send it to yourself through the paper mail. Leave the envelope sealed. The postmark will be your proof of the date. A lot of people tend not to trust electronic records (or may not understand well enough to know they should trust them).
Make sure to document account removal request (Score:5, Insightful)
Re: (Score:2)
Not only that, but what happens if, after you leave, someone hacks their system and just so happens uses your account to do so? That's not going to look good, no matter how much you claim to be innocent.
6 out of 10..... (Score:4, Interesting)
Have copies of companies assets in their possession. OR physical assets of the company still in their possession.
I was cleaning out some junk data the past weekend, went through my archive of 900+ CD-R's of the past 14 years and found several discs that I shredded as they contained company data from old employers. I also found a binder with a printout of some sourcecode that was for a old job from before 1995.
I dont worry about the guy that can access a server at work, I worry about the guy that leaves the job with a 64gb thumb drive that has the entire customer database on it.
Re: (Score:2)
I do agree that people stealing confidential databases (or losing laptops with that data) are the bigger threats.
Re: (Score:2)
I dont worry about the guy that can access a server at work, I worry about the guy that leaves the job with a 64gb thumb drive that has the entire customer database on it.
You hit the nail square on the head there. I have access to several former employers; I even have access to one site where I shut off my own access before I walked out the door. But then my replacement did not work out and they begged me to help them find out what was going on...I had to come back into the building and hack into my old servers with a boot disk to restore my access and undo the work of my "successor".
Generally, a true IT professional can be trusted after they leave, because if they wanted
It's quite common (Score:5, Interesting)
Most places will happily give you every password in the world when you start a job there. And sometimes the "intermediate" stage between you leaving and someone else doing your job is filled with outside contractors and random people who "need" your passwords.
Whenever I leave an employer, I make a BIG list of everything I know in terms of passwords, passcodes, keys, etc. and compile it on paper or a CD. I put literally everything in there, even down to little foibles of the system and the reasoning for strange configurations. I then furnish the boss with one copy of that CD, hand him another copy to "put in a safe place" (usually a safe) and then leave.
I did this at my last workplace. They were getting increasingly silly and employing people with zero expertise, and I already had another job already lined up so my entire notice period was spent house-cleaning and compiling lists while taking care of the mundane jobs.
Technically I reported only to the headteacher of the school in question, having been employed by him without any formal assignment in a staffing structure (to the point where the local borough phoned up to complain that I was earning too much for any of their pay-scales and had to be put on my own unique one).
When I left, there was no replacement for me (because they weren't interested in employing the only guy out of all the candidates that *could* do my job because he had formerly worked in Tesco's supermarket rather than sit on his arse in the middle of a recession) so I handed off to the headteacher. This immediately caused an argument because one of the new staff who was the new "second-in-command" there (and that decision was partly responsible for me wanting to leave in the first place!) DEMANDED the "admin password for the network".
He wasn't an IT guy. He knew nothing about computers at all. He just wanted it because he was sure that the dozens of digital voice recorders that he'd bought on a whim (without IT authorisation) could be made compatible with the non-networkable, kiddified, decades-old audio editing software he'd bought on a whim (without IT authorisation) on the network he didn't know how to manage, no matter how many times I told him they were incompatible. He was convinced that if he somehow got the "magic" administrator's password and then let 1000 kids loose with it so they could listen to themselves talking, it would solve his problems with not teaching part of the IT curriculum.
Obviously I must have been deliberately lying when his DRM'd-AAC-only recorders couldn't be opened in a program that only took WAV's (not even MP3's!) and that an intermediate conversion step (which he DEMANDED shouldn't be necessary and refused to use) was required.
Apart from the fact there were three networks, there were dozens of different passwords, and he wasn't getting *ANY* of their passwords until I was way outside the building and long gone, I had a duty to protect the information secured by those passwords (information on kids, people's salaries etc.). If you read the rules precisely, that means that I had to hand off ONLY to the headteacher, who could then hand off passwords to others as they saw fit.
So I did just that, in the process making my own day by telling the guy "No." even if he WAS second-in-command there (he didn't seem to understand that I didn't report to him, no matter what he thought of that idea). He was rather miffed. I also, with the head's permission, gave a copy of the CD to the lead governor of the school who was a big-iron IT guy for his day-job, that we both knew we could trust - he would be fixing any major issues that occurred in the school until they could find a replacement and he was there to sign-off on my hand-over.
A week later, a phone call from the second-in-command. He'd got the administrator password, tried it out on several PC's and couldn't do what he wanted (ignoring the fact that he wasn't using ANY of the network software management that we had in place). So he demanded that I give
Quest. (Score:4, Insightful)
If only the company who commissioned this survey happened to sell a bunch of account and identity management tools.... Oh, they do? What luck!
We're just worried about passwords? (Score:2)
The company I'm currently working at hasn't changed the alarm system code in 10 years. They've fired several vengeful people in that time, plus we've never modernized with a facility access logging/keycard system. Yep, 200 employees all use the exact same master key that opens every door in the company.
A former employee with a copy of their physical key could access a nearby building undetected; disable the alarm; and shut down a major fiber backbone line between Salt Lake and Las Vegas.
Don't know; don't wanna find out. (Score:2)
Re:Does a real "Pro" even know? (Score:4, Funny)
Yes a real PRO knows.
My desk at comcast, one I have not sat at for 7 years now is STILL empty and has my PC on it's desk logged in and running as me. I know this as friends in the department tell me that they still have not moved from my test server on my local machine to a production server so they simply still log in as me with the same password. That will teach them for hiring only MCSE's, one linux box confuses them.
They do use my cube as storage though.
Re: (Score:2)
provide name of the bank, login credentials and passwords ... or it did not happened.
Re: (Score:2)
Not necessary. They have a secretary doing that for them. I had a boss who didn't know his own password because his secretary did everything "computer stuff" for him. Basically, all his electronic communication was rerouted to her, technically she WAS him, in everything computer related. She was the one who got his email, she was the one who replied to his emails, she was the one who wrote his emails. More and more often without him even getting involved.
Whether this is a good or a bad thing depends on the