Comment Re:Do power users abuse their IT knowledge? (Score 2, Informative) 460
I don't understand why people always try to "get around" these restrictions. If there is a legitimate business need, then get it approved. These preventions are put in place for a reason. The more open the network, the more risk. The more risk means more virus, trojans, botnets, data leakage, etc. IT then has to cleanup your mess.
Partially right. The problem is, that in many larger organisations the 'legitimate business need --> approval' process does not scale well with regard to the time required to get the approval. So even if you do have a legitimate business need, waiting for the approval might still keep you from getting your job done. Multiply this by say
It seems to be difficult to balance these things. But having a good zoning concept at hand might be of great help. It keeps the wrong people from tampering with critical resources, but it also allows employees to use necessary services e.g. SFTP. Yes, I've come across a situation were I was not allowed to get a patch from a vendor using SFTP. The idea was: SFTP may be used for stealing data. Use FTP, this is far more secure, as we can scan it with deep packet inspection.