88% of IT Admins Would Steal Passwords If Laid Off 448
narramissic writes "According to identity management firm Cyber-Ark's annual 'Trust, Security & Passwords' survey, a whopping 88% of IT administrators would steal CEO passwords, customer database, research and development plans, financial reports, M&A plans and the company's list of privileged passwords if they were suddenly laid off. The survey also found that one third of IT staff admitted to snooping around the network, looking at highly confidential information, such as salary details and people's personal emails."
Reminds me of the old joke... (Score:5, Funny)
99% of men masturbate. The other 1% are lying.
Re: (Score:3, Funny)
"99% of men masturbate. The other 1% are lying."
I never masturbate, but I don't advise licking the stalactites in my cubicle.
Not reasonable (Score:5, Interesting)
Re: (Score:2, Funny)
we store all our important details in a seperate UNIX user account, whose password we don't divulge to sys-admins, so good luck stealing our documents...
Re: (Score:2, Interesting)
in most cases IT has root- and/or physical access to the servers which means your password is merely gonna hold any determined sysadmin back for a few minutes.
Unless you're using additional measures (certain methods of encryption for example) the "security measures" you desribe arent worth a thing
Re:Not reasonable (Score:5, Informative)
It's off topic, but please tell me more about your IT infrastructure. I promise to to do anything bad with it.
I am constantly amazed at how willing people are to tell you how to attack their own systems, particularly on Slashdot, where simply implying somebody is doing poorly will practically get you full description, network maps, and vulnerability reports.
Similarly, I was talking to a friend in the Army the other day about IT security, and he told me that he didn't think I could attack his unit's systems, then went into a long discussion about what protections are in place. Out of curiosity, I decided to find out what I could learn. He only clammed up when I started probing for specifics about password policies on a particular device.
People: please don't tell anybody about your IT configuration. At least not on a public forum like /. Admittedly, a lot of it is easy to find out other ways, but that's no reason to give that information out.
Re:Not reasonable (Score:5, Funny)
I once got what I assumed to be an attempt at social engineering into our systems.
Caller (who did not identify himself): "Hi, would you be interested in completing a survey?"
Me (bored): "Uh, alright."
Him: "Can you outline for me the steps you take to ensure the security of your IT systems?"
Me: "Absolutely! First, I do not discuss my security configurations with unknown people. Have a nice day." and then hung up on him.
Re:Not reasonable (Score:4, Interesting)
I've been on the other end of that kind of thing. I had a client, who had an employee they suspected of doing something shady. The employee had already given notice that she would be leaving the company, and was finishing up her two weeks or whatever. Anyway, the boss asked me to set up her e-mail account to forward a copy of all her e-mail to him, so he could essentially spy on her incoming e-mail without her knowing about it.
I weighed the moral implications briefly, and decided that since this is a company e-mail account intended to be used exclusively for business purposes, and there was a specific issue he wanted to investigate, I didn't have a serious moral objection. Not entirely comfortable, but he's the boss.
The trick was, their ISP was hosting their e-mail accounts. They didn't have a domain name, just individual mailboxes for a couple of people. So I called them up, explained that I was the company's IT guy, and asked them to set the mailbox in question to forward a copy of everything to the owner's e-mail address. I gave them the address to forward the mail to. They set it up without question.
Re: (Score:3, Funny)
Well,
Since you're asking:
You can access my network by going to http://192.168.1.1
The password to get in is "admin". There is no username.
Once in there you can make any changes you want. Just please remember to e-mail me when you're done.
Thanks!
Re: (Score:3, Funny)
Then again, it's
Re: (Score:3, Funny)
its not yours anymore
Re: (Score:3, Interesting)
Really, Cause I was helping out a friends business that had a crappy d-link router.. Chose the cisco 508 router over the linksys. It was utter crap. Would randomly drop its wan connection, and take 10 minutes to reconnect. Tech support were idiots, and said it was the cable modem. Linksys router plugged in, setup in 5 minutes, and hasn't rebooted yet (its been 6 months!)
Re:Not reasonable (Score:5, Funny)
Doesn't work , my router is on 192.168.123.254
However , if you enable remote access on your router , you have a chance of winning a lottery. All you have to do is sign up , and give your external ip as a reference , if your ip wins , you win the great amount of $50M ( fiftymillions US dollars ) . It's from my aunt in Nigeria who died in mysterious plane crash.
Re: (Score:3, Insightful)
I am constantly amazed at how willing people are to tell you how to attack their own systems, particularly on Slashdot, where simply implying somebody is doing poorly will practically get you full description, network maps, and vulnerability reports.
Similarly, I was talking to a friend in the Army the other day about IT security, and he told me that he didn't think I could attack his unit's systems, then went into a long discussion about what protections are in place. Out of curiosity, I decided to find out
Re: (Score:3, Interesting)
Re:Not reasonable (Score:5, Insightful)
Yes, it's security through obscurity, and I'm as big a fan of Schneier as anybody, but that is still no reason to give out information.
It's no secret that with enough knowledge of the system, any system can be hacked. That alone is reason to not make knowledge of the system public information.
To some extent, security through obscurity is absolutely necessary.
Re:Not reasonable (Score:5, Insightful)
Not if your systems are properly secured. Unless you consider obscurity keeping your actual password(s) secret :)
Seriously though: most systems have some vulnerabilities and explaining the details will occasionally open the door for someone who knows more than you do. Yes, it's good to keep this information private. BUT, when designing a security system you need to work based on the assumption that an attacker knows the entire layout. Knows exactly what hardware, software, version, firmware, etc. you have exactly. Anything less is NOT a properly secured system.
If a network is properly secured the person/group/department who designed it should not be able to gain unauthorized access
Re: (Score:3, Informative)
Seconded. I work in banking, and the primary assumption in fraud prevention is that your procedures have to reasonably control fraud/theft attempts where fully authorised employees are involved - and then 'purely outside' fraud gets covered by that as well.
Re: (Score:3, Insightful)
In real life, including 'banking', there are often holes that are left because of business requirements and policy. These holes include not patching core servers to avoid instability, retaining legacy systems that are no longer supported but for which there is no budget to replace them, or using internal applications that are unencrypted but for which source code no longer exists or for which encrypting them would overload the server.
I've seen all of these. I don't publish where they occur.
Re:Not reasonable (Score:5, Interesting)
The odds of running into a malicious hacker when looking for technical help are nearly nil. Hackers simply don't work this way.
It's called Google, and hackers absolutely do work this way. I should know.
Let me tell you a little story.
I am a penetration tester by trade. I was tasked to look into a particular company's custom-built project-management app, which I had no prior knowledge of, access to, or even IP addresses for.
After a bit of googling, I came up with the names and email addresses of a few developers (some of whom no longer worked for the company). Googling those email addies, I found posts on various forums for MsSQL administration, ASP coding, and cisco routers. Within only a few minutes, I knew the hardware that the system was running, the firmware version on the router, the technology in use, and even had some code samples pulled straight from the app.
I located and compromised that application with no prior knowledge in less than an hour.
Having other people "check your work" is a GOOD thing and it's how IT security is actually improved in practice
Yes. Having Project Managers, your programming peers, and a security auditor with an NDA check your work is a good thing. Having some random guy on a forum check your work, and publish the results where they will be archived, index and searchable forever, is an extremely stupid idea.
Re:Not reasonable (Score:5, Funny)
Re: (Score:3, Insightful)
I know you're just being funny, but to put a point on your post - you're still subject to the cleaning staff.
Any idea what it takes to get hired on as a janitor? Not much I suspect.
-Matt
Re:Not reasonable (Score:5, Funny)
Re:Not reasonable (Score:5, Funny)
Re:Not reasonable (Score:5, Insightful)
Sounds like an unreasonable estimate to me.
I would be much more interested in the percentage that has already stored such information just in case such an eventuality occurred.
Re: (Score:3, Insightful)
Re:Not reasonable (Score:5, Insightful)
A company hawking privacy management claims your IT department is filled with thieves and extortionists. Shocking, I tell you, shocking!!!!
Re:Not reasonable (Score:5, Funny)
And they thought to warn us, how considerate. Perhaps they also have the perfect solution to the problem.
Re: (Score:3, Insightful)
I can't believe 88% of those surveys would steal data simply because they were layed off, presumably to turn to a life of crime that would likely pay less than just getting another IT job. We're not talking about janitors stealing trash liners here, IT Admins mak
BOFH (Score:5, Funny)
You've never seen my personal IT Bible, the Archives of the BOFH.
He exemplifies keeping a system running smooth THROUGH vindictive and dishonest means.
He's my Hero.
Re:Not reasonable (Score:5, Interesting)
Sounds like an unreasonable estimate to me. If people were that vindicative and dishonest then IT (and similar) systems wouldn't ever keep working.
Why is Parent comment not modded "Funny"?
A) I don't know if I would have guessed these numbers exactly, but it certainly shouldn't be a totaly surprise to anyone who's worked in IT for any length of time. B) 300 is not even close to a statistically relevant sample size.
That said, the part that I think is interesting is that this corruption is more intense the higher you go in the corporate ladder. What makes that funny upon interesting is that I think the C-level folks may think they're the only ones who do this - this article might actually be news to them. Now that is funny!
Layoffs, by the same token, in practice are generally every bit as corrupt, vindictive (in who gets selected to go) and dishonest (they're usually to boost quarterly profits). Businesses still work (relatively speaking anyway) in spite of that as well.
I'd say this article and the study itself are slanted against workers.
-Matt
P.S. This is another POS Computerworld article - Computerworld UK this time. IMHO, anyway.
Re:Might Be Reasonable (Score:5, Interesting)
I've been through a couple of layoffs. In one, the company was concerned about stealing, sabotage, and other vindictive behaviours. So they surprised everyone with two week severance packages and an escort out the door one morning. They brought in people at the butt crack of dawn to turn off every computer in the building. Later, "core" people started deserting the company, taking whatever they wanted with them.
In the other one, there was an announcement, something like, "The 20 people in this room are being laid off. Starting in two weeks we're going to lay off 4 people per week for 5 weeks. We expect you all to continue to do your jobs as well as you can *while* you look for work. Let your supervisor know of any scheduled interviews, they will be considered paid time off. As you find work report your start date so each week we can try to lay off people who already have new jobs."
The second layoff went without a hitch. The people laid off kept relations with the company, some came back later.
I know it's not the same as firing someone, but it does seem to me some companies treat laid off employees as if they've been fired.
Re: (Score:3, Insightful)
And, of course, check every server for cron jobs...like the one that just exits if the last login time of "joeuser" was within the past day/week/month/whatever, but otherwise does very nasty stuff as root.
Seriously, as others have said, treat them like you would want to be treated, and you won't have any problems, and might be able to continue to find people that want to work for your company.
Re:Might Be Reasonable (Score:5, Funny)
Sabotaging a network is no different than setting fire to the building.
B-b-but, but but, they they took my stapler. It's the - the red swingline model.
a survey (Score:5, Insightful)
Yea, and I'm training to be a cage fighter.
More like 88% of IT Admins like to say they would steal CEO passwords if laid off, but something tells me when the time came to break the law they would let the opportunity slide.
Re: (Score:2, Funny)
I could program a virus that would rip that place off bigtime......bigtime
Re: (Score:2, Funny)
I could program a virus that would rip that place off bigtime......bigtime
I believe you have my stapler.
Re:a survey (Score:5, Insightful)
...but something tells me when the time came to break the law they would let the opportunity slide.
And they'd be wise to do so. Anyone who thinks that stealing such things once laid off is a bright idea just does not have a criminal mind.
Think it through, fellas - what, exactly, do you plan to DO with this data?
Do you intend on working in your field, ever again?
How do you feel about seeing the inside of a federal prison??
Seriously, lay off the power trip. It's just a fucking job. Don't screw up your ENTIRE life just because you have the password...
Re:a survey (Score:4, Informative)
That brings up a good point... (Score:3, Informative)
I'd guess that they probably used a lot of leading or misleading questions in a poorly defined sample group simply to release some press kit.
Which makes them sales people and that's a much lower rung in the IT world.
Re: (Score:3, Funny)
Depends.. Would that be "Conjugal Visit Prison", or "Pound Me In The Ass Prison"?
Re:a survey (Score:5, Funny)
"Conjugal Visit Prison", or "Pound Me In The Ass Prison"?
Depending on your perspective... Yes?
Re:a survey (Score:5, Interesting)
If you are that good as a IT admin (or any other position, for that matter), if you are that good, they will have already done more damage to the company by firing you, that you could do deliberately back to them.
Recruiters estimate that simply by firing one person and hiring another, a company will lose around $120,000 in productivity alone; HR and accounting paperwork to fire that person, redundancy payments for several months in advance, along with recruiters fees to find someone new, time taken by existing employees to interview possible candidates, more HR and accounting paperwork to hire the person if there is a match, and time taken by the new employee to get up to speed. Not even considering that other people may be waiting for various tasks to be completed by the person in that position.
Best Revenge Ever... (Score:5, Insightful)
... Is being missed.
I was vindictively fired by a total idiot. I made sure that everyone I knew at the company knew the hows and whys of my dispute (including where I _was_ at fault). I also always start grooming my replacement the first day I take a job or can identify the best guy to replace me, because who wants to be stuck in the same job forever.
In the days following my firing I took several opportunities to talk the guy who replaced me (my friend Dan) how to lock me out of various machines and such.
For almost eighteen months people at that job were forced to say "is a good thing (my name) made sure we had extra capacity laid in while the trench down the block was opened", or thing-x was purchased, or policy-y was in place.
By the end of that eighteen months, the guy who had fired me had been shown to be the kind of person who he was, and he was invited to leave the company. (I was long gone and made no attempt to return.)
If you have to "do something" to your company to make them feel the pain of your absence when you are gone, you weren't previously doing your job.
Competence, and never looking back except to laugh, is the best revenge ever.
Re:a survey (Score:5, Interesting)
I agree, accidently deleting a huge database is better. go in, yank 1 cable from the back of the server and plug it back in from one of the power vaults to the Raid 50 and the raid will eat it's self over the course of 2-3 days. Without any admins familiar with it, they will not get the pile of raid failure warnings until most of the DV and files are corrupt. Bonus points if it takes 2-3 weeks and all the backups are corrupted as well.
Impossible to trace or prove anything was intentional, and it screws them good.
There are at least 80 other ways to cause gradual data corruption that without familiar IT staff on hand will grow out of control by the time someone finds it.
Screw stealing passwords or data, just start a chain of unfortunate events.
MY favorite is to make some very restrictive rules in the company firewall and then save it, revert to the old rules right before you're laid off. the date stamp will be from months previous and confuse anyone tromping around in it.
Re: (Score:3, Insightful)
Because we don't go to their schools, date their daughters, or otherwise count as being human beings in their world.
Re:a survey (Score:5, Insightful)
Uh... as the admin what need do I have for the CEO's password? I have more access to the network than he does.
I'd have to agree this whole article sounds like BS to me.
Re: (Score:3, Interesting)
Snagging the CEO's password isn't about access to the network.
It's about impersonating the CEO.
E.g. Go to some underfunded public library far from your home, install the VPN client from the disk you have laying about at home... whoala... You can send,receive,reply to,and delete email as the CEO. Imagine the damage you could do. Likely the best tactic would be to not "invent" anything, but just forwarded well chosen items from his Sent Items folder to t
Re: (Score:3, Interesting)
I dunno..
I've worked at some companies that were really strange. In one particular place the CTO had some interesting files in his share. Now I'm a not a prude by any means, but this guys share had some weird sh*t. At least my p0rn is wholesome (yeah yeah, one man's wholesome is another man's bestiality... baaaah and moo to you). It's tough not to notice when the guys fileshare took up close to 80G out of the 100G allocated to the entire company (this was the days before 1TB drives were common).
They guy was
In other news... (Score:5, Funny)
12% of all admins were laid off today in order to clear up resources for paying ransom on old passwords...
New Poll (Score:5, Funny)
88% of IT Admins Would Steal Anything to get Laid
The solution: (Score:2)
And Cyber Ark are selling? (Score:5, Insightful)
Let me guess...
Re: (Score:2, Insightful)
Re:And Cyber Ark are selling? (Score:5, Insightful)
This is silly. (Score:2)
Better go the pre-emptive way: make offside backups before the shit hits the fan.
Re:This is silly. (Score:5, Funny)
Better go the pre-emptive way: make offside backups before the shit hits the fan.
Bad idea. You'd get a 5 yard penalty on the play.
Figures Seem Inflated (Score:5, Insightful)
Re: (Score:2)
Snooping over the network out of curiosity, I'll buy that one.
Snooping over the network is part of an admin's job.
But... (Score:5, Insightful)
How many of them are just saying that to sound cool?
Inaccurate? (Score:2)
95% of statistics are made up on the spot.
Re: (Score:2)
Re:Inaccurate? (Score:5, Funny)
as for who they actually ... who knows?
300 felons recently paroled for computer and technology related crimes.
Strong morals? (Score:5, Funny)
Re: (Score:2)
The PHB has beaten it out of them.
Betray the betrayer? (Score:5, Interesting)
When someone is laid of for no apparent reason, they often feel hurt and betrayed. A natural reaction is that the trust between them has already been destroyed.
At one company I was with, a sysadmin was on a conference call, and had his hands full when the call ended. The CEO never hung up the phone, and started talking to his assistant about people loosing their jobs and how much severance would be paid. The sysadmin, who probably should have hung up when he was first able to, couldn't resist listening for a short time. After a couple of minutes, the CEO finally realized that his phone was still on, and hung up the line. By that time, the sysadmin knew that several people would be laid off soon, but not how soon, or which people.
He informed a couple of his friends that the company was in worse shape than he had realized, and discretely began updating his resume. Within a month, the company was bought out and closed down by another company and everyone lost their jobs. He was asked to stay on as part of the transition team and that the new company would pay him, but after a couple of days, it was clear that he had been working for free and the new company was not going to honor the agreement.
At that time, he still had sysadmin access, and began to look through emails of the former employees. Some, including the CEO, were still getting and sending emails through web access through the old company server. He learned that although the board of directors did not want to spend the money to make sure that the fired employees could still have health insurance for a couple of months, they were willing to give the former CEO $25,000 for his efforts.
I have always said that a good sysadmin knows all the secrets of a company, but a great sysadmin knows when not to look. In this case, was the sysadmin justified in looking after he had been promised to be paid and then told he was not being paid? (Yes, his access should have been cut off, but he was the one who would have had to cut himself off and he was never told to do so.)
Although this situation may be unique, I think that many sysadmins may feel the same way. Once they are betrayed, they no longer feel the need to stay loyal to those that betray them.
Re:Strong morals? (Score:4, Insightful)
And they do - Those morals and ethics just don't overlap 100% with "corporate policy" (or for that matter, "the law").
And I don't mean that as a joke... IT pros have a rather unusual role in the history of humanity, in that without trying, we become aware of far more details of peoples lives than they realize. Even priests in the confessional don't have the insight we do - People can lie to their priest. They can't lie about logfiles.
People, as a whole, count as (by their own standards) hypocritical perverted criminals. They all (and I mean that deliberately as an unqualified universal quantifier) do things they would themselves describe as disgusting and/or reprehensible if asked in a neutral context. They all steal, they all lie, they all cheat, they all put #1 ahead of everything else unless pretending to do otherwise will result in a self-preferable outcome.. And you expect those of us who know (rather than merely suspect) this to have a traditional world-view when it comes to right and wrong?
I think the survey should have asked a slightly different question, to make it more meaningful... "Do you already have memorized enough info about the company to bring it to its knees if you decide they've really screwed you over"? And I'll bet you'd get a similarly high percentage answering "yes".
Re:Strong morals? (Score:5, Informative)
Scoundrels always think everyone else is a scoundrel, too.
Survey is Pants (Score:5, Insightful)
"According to identity management firm Cyber-Ark's annual 'Trust, Security & Passwords'"
Making the IT folk out to be bogeymen is great business for security pros. I'm sure there are some idiots out there, but most IT people are normal honest people like anybody in any other profession. I don't buy that we are so far off the curve, 81% is bullcrap and makes me question everything about that company and it's motivations and methods for the survey.
Nothing to see here (Score:5, Insightful)
Post here if you're a minority as well (Score:5, Informative)
I haven't, I wouldn't. At best you encounter some of those things during ordinary work or even unproductive boredom.. but I totally see no value in having such details of a place you no longer work.
(Of course here in Europe there's a due notice so you have plenty of paid time to find a new job, but still..)
Maybe I'm just daft or weak?
Re: (Score:2)
If i'm using the DBs i'm either making some necessary modifications or doing some sort of profiling/tracing. If i'm not using the D
I'll go you one better.. (Score:3, Funny)
.. I have a 120dpi scanned transparent GIF of the CEO's signature.
Re: (Score:2)
I've got hundreds of signed timesheets signed by the CEO.
It's an ethics issue, not a technological one... (Score:2)
Just because we are talking about technology workers does not imply that they are a more virtuous bunch. Unethical behavior has existed as long as man, and if anything a scumbag is helped immensely by the power of technology to do immense damage.
Let me guess (Score:5, Insightful)
....you take a survey saying something like "Have you in your work had access to..." or "Have you known company information after leaving..." which you often have then tweak it into "IT admins spy on you and will steal your IP" in order to make FUD and sell your product? I think I know enough people in the IT business to tell that these numbers are horribly off.
The other 22%... (Score:5, Insightful)
When I was an admin (short stint so I could pay bills, 3 years) I usually didn't give a rat's ass about what the users stored on their system unless it showed up in my virus scan reports or I was told to investigate someone due to "suspicious behavior". (BTW folks, before you get off on the 'evil spying on users' tangent for me, it was only twice and it was two girls working in tandem selling info to another company on how much certain people were paid.) I never could understand the whole "I have the power!" attitude some people showed when it came to passwords or how they'd screw the company if they were laid off. If I felt I was unfairly fired or downsize or funsized, whatever, that's what my lawyer is for (he works for cheap cause I fix his laptop, heh). Why complicate issues by fudging with the network access?
Maybe I'm just too young to understand yet. Now if you'll excuse me, I have to play with my army men, we're planning an attack on the tan army on the coffee table and I gotta move equipment for em.
Re: (Score:2)
Re:The other 22%... (Score:5, Insightful)
As a system admin who has access to ten years of email at an institutional finance firm, I can tell you that I have absolutely no desire to go through these records; sure there would be juicy tidbits about office relationships, hot stocks, whose getting what promotion etc but your integrity is way too valuable for any such tomfoolery. Moreover, my experience is that my coworkers have pretty much all been of like-mind. There's just no upside to doing any of the things listed in this article; it most certainly will not get your job back nor will it help you get another job and as has been said before it will get you put in jail.
And, as was said earlier, it's so shocking to find a company that does security consulting say that the weakest link in your security chain is your people, I mean who would of thunk it? Oh wait, Michael Milken did way back in the 80's and I'm sure someone else did it before him...
I think the operative word is 'suddenly'... (Score:3, Interesting)
Typically, (at least in companies with some sense) the decision to remove an IT worker is made in advance, with steps taken to drastically reduce that individual's ability to do damage.
Rarely, is an IT worker told about their demise until steps are in place to have someone watch that person pack their belongings, upon which they are escorted to the door. They would be lucky to steal their favorite coffee mug is such cases.
Stupid is the company that gives notice to someone with keys to the kingdom, except in cases where the person is needed to stick around to train their own replacement.
But then, anyone who would agree to do that without MASSIVE compensation, is a pussy.
That said, I do know a guy who kept a series of special GPOs at the ready when he figured he was on his way out of HP back in the day...
In other news... (Score:2)
80% of people talk big about all kinds of hypothetical situations and then turn tail when push comes to shove.
Layoffs vs. Firings (Score:2)
Seriously? You'd steal passwords just because you were laid off?
Remember that layoffs aren't the same as being fired. If you're laid off, you're likely to get a good recommendation from your boss for new jobs you apply for. Why would you want to burn that bridge?
Now, if you were fired because your boss was incompetent and used you as a scapegoat I could sympathize, not condone, but sympathize.
Re: (Score:3, Informative)
What if a company decides to make you "redundant" with zero warning (illegal in the uk) and zero severance package (also illegal in the uk)
You're being fired on the spot without being paid for the last few weeks work, but they call it a layoff, so you're fine, right? You'll get your severance in 6-12 months through a tribunal. Well, half of it after the no-win-no-fee solicitor's had his share...
Your potential employer wants a reference. Do they get it? Do they hell. Legal recourse? None. You want to pay you
88% of IT Admins Are Stupid (Score:5, Insightful)
If I'm ever show to the door, I would insist on my ability to operate on the system being terminated at that moment. I don't want VPN access. I don't want an email account. I don't want SSH keys. I sure don't want the boss's password. Why? Because I don't want to be accountable for anything that goes wrong afterward.
Think about it, people. If the IDS catches you SSHing in a couple of weeks after you've left, then they have carte blanche to hold you responsible for whatever breaks, even if it's totally unrelated. Good luck convincing a jury that Oracle coincidentally just happened to explode an hour after you logged into your old workstation. Seriously, what good can possibly come from putting yourself in that situation?
and the results aren't tainted (Score:2)
by the fact that Cyber Ark's business is privledged account management, would it?
The other 12% (Score:2, Funny)
It depends on your definition of "stealing" (Score:3, Interesting)
When I am leaving a job, I'm not actively concerned in making sure every piece of knowledge about my tenure is forgotten and every napkin I may have scribbled something on is returned or destroyed, and every backup I've made is destroyed because I use a lot of the scripts/docs/etc... as part of my new job hiring interview. Conversely, most firms I've worked at haven't changed their admin passwords or door codes when I left, so they don't seem particularly concerned either. (Which may or may not be normative.)
I would say that the time when most IT folks are going out of their way to collect information is if they feel like they're being setup for the fall guy. At my last gig my project lead liked to broadcast the whole group when a server went down (blaming me) so I was maticulous to keep a copy of every log, logon time, email from her, so when I was accused, I could defend myself to our supervisor. If you're being laid off for some straight-up BS; and you're acute enough to see it coming, you better bet I'm going to collect as much as I can to clear my name. Beit to that firm or my new employer should I get a bad reference.
What? (Score:3, Funny)
I probably already had them, no need to steal them on the way out the door.
Seriously, I'm kinda glad to not be doing sysadmin stuff any more, except for my own systems. I was called in pretty regular in the old days to 'secure' the system just in advance of the incumbent being dismissed. Always a nasty business, both because the incumbent was usually capable of great harm, and because their boss was invariably 'difficult', and often wanted guarantees that the fired employee would never get back into their systems. I told one CFO that you could only be sure if you cut off both hands, put out both eyes, and seal him in a grave. Funny, the CFO took more than a moment to tell me that wasn't an option. I know he was wondering if the lawyers could be more effective.
Dumb insolence works better (Score:3, Funny)
Confidential salaries? (Score:3, Insightful)
If the company considers salary information "highly confidential", they have bigger problems than their IT staff.
As a former admin who was laid off... (Score:4, Interesting)
The last thing I wanted was to be in a position where someone hacked the systems and I got blamed because I "knew the passwords"....
I even handed over my personal notes on the network and had my boss shred the ones he didn't need before I left.
I can't believe there are that many admins who have that little respect for themselves that they'd be willing to steal passwords.
Re:As a former admin who was laid off... (Score:4, Interesting)
That's what I did when I was walked out two weeks into my three week notice. I walked down to the office of the guy that was going to be handling my work until a replacement was found, disabled my VPN access and account in front of him and the Security manager, and then left the room as the administrator password was changed.
Even with those measures, I was still the first person blamed when one of the plant networks went down two weeks after I left (and on the first day of my new job of all times) due to a hardware failure (fiber-to-ethernet converter...and had I been allowed to have that last week, I would have been able to a few peopel to fill in for me...turning a two day outage into a five to ten minute outage).
I think all sysadmins should review this (Score:4, Interesting)
Re: (Score:3, Interesting)
I agree with you on all points. I too have integrity and work by the lopsa code of ethics
Unfortunately, my unwillingness to violate that has kept me from advancing in my career. Someone else is always willing to forego ethics for the almighty dollar.
I am not.
why would they need to steal the CEo's password (Score:3, Funny)
Re:Not a surprise. (Score:4, Insightful)
Another reason to hire older admins, younger ones get bored easily and as a result commit more mischief, I remember the last few years I worked, it seemed that the younger people were always trying to find out how to bypass Squid to go look at porn sites, etc.
It just made my job harder and more annoying. Short attention spans and an inability to function without continuous entertainment seems to be a common failing among millennials.
Re:Not a surprise. (Score:5, Insightful)
This is one of the things that I love about proxy firewalls. I have colleagues that try to run connections over port 80, and then get stopped because it's not HTTP. They come complain to me, and find a very unsympathetic ear.
I am bothered by the poor ethics of those around me. They think nothing of talking in the aisles about which BitTorrent sites get them the best movies, or how they only watch screeners or play cracked games because only stupid people pay for entertainment. They get frustrated when they run into refusals when trying to get the discs or keys for Microsoft software for which they have no clear need, and try to talk me or the other two people who do have access to them into giving it to them. I tell them that if they need it cheaply that bad they should get a TechNet subscription. They usually just wander off at that point, or sometimes storm off, as if they were somehow entitled to it.
I used to grab everything that I could off of various sites, pulling things down over Kazaa or eDonkey at the time, but I've left that in the past. I've got a job that pays well, and I know they're not underpaid.
I think that ethics in IT have slid dramatically downhill, so that the norm seems to be that people don't want to get caught, rather than not wanting to break the ethics guidelines in the first place. I'm not sure what exactly to do about it, other than try to set a good example. But even then, I've heard some suggesting quietly to others that I'm just hiding my own sins (hint to those people: make sure I'm not in the cubicle next to you when you talk about me). I'm at a loss at that point.
Re:Not a surprise. (Score:5, Insightful)
In other words, now that you've had your fun you're going to go criticizing the young whippersnappers having theirs.
Re:Not a surprise. (Score:4, Informative)
Most of them aren't young. I'm 33, and the majority are about my age or older. With one exception, the youngest is 30.
Even when I was 'having my fun,' I was smart enough not to talk about it out loud at work. Keys were sometimes passed along quietly, but that usually happened when walking between buildings. Bursting into a room announcing that you've found a download site for the movie being released this weekend is bad form, but it's happened a few times this year alone.
Wow, (Score:3, Informative)
88% though?!? That's staggering, I have a hard time believing that ethics in the IT industry are so poor to validate a number that large? I want to know details about who they surveyed to qualify that number.
I know that the sociopath mentality is the way of the road at the top of some parts of corporate American (especially in the energy industry it would seem), and I wouldn't be surprised to see this number if it related to executives based on the nightly news, but in my IT circles we look on that behavior