grrlscientist writes: When the University of Victoria in Canada opened a new campus bike centre in the parkade located under the University Centre last November, motion-activated doors were installed to discourage swallows from nesting in the new facility. But when the swallows returned to their familiar nest sites a few weeks ago, they were undeterred by this peculiar impediment: they quickly learned how to open the doors by flying in front of the infrared motion detector.
from the just-turn-off-db-access-for-everyone dept.
imus writes "Just wondering how most IT shops secure sensitive data (customer records). Most centrally managed databases seem to be monitored and maintained very well and IT workers know when they are tampered with or when unauthorized access occurs. But what about employees who do legitimate selects from these databases and then load CSV files and other text files onto their laptops and PDAs? How are companies dealing with situations where the database is relatively secure, but end-use devices contain bits and pieces of sensitive business data, and sometimes whole segments? Does anyone use sensitive data discovery software such as Find_SSNs or Senf or other tools? Once found, how do you deal with it? Do you force encryption, delete it or prevent extracts?"