Tech thieves and dishonest dealings redefine network security

Malware and DDoS attacks don't sound so bad compared to these IT tales of missing inventory, dishonest bosses, and sleazy deals

Ah, security -- it's a constant issue for tech pros. But preventing security breaches from the outside is one thing. What about the bad apples inside the company ranks that wreak havoc in other ways? Was "sleuth" part of the IT job description?

Here are a handful of stories from the Off the Record archives that are written by tech pros about their memorable experiences dealing with missing tech inventory or other shady dealings in the workplace. It may seem surprising that these code jockeys and system admins would take to detective work so readily, but when you think about it, it's not so far removed from tracking down bugs in code or troubleshooting a faulty server. At the end of the day, it's all about solving problems -- an IT specialty.

[ If you want to cash in on your IT experiences by publishing a story in the Off the Record blog, send it to offtherecord@infoworld.com. InfoWorld is looking for your amazing or amusing IT adventure, such as managing IT, developing apps, supporting users, times when IT and business expectations collide, or even a lesson learned -- stories that are memorable to you. If we publish it, we'll keep you anonymous and send you a $50 American Express gift cheque. ]

This story, "Tech thieves and dishonest dealings redefine network security" was originally published at InfoWorld.com. Read more crazy-but-true stories in the anonymous Off the Record blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.

Mobile Security Insider: iOS vs. Android vs. BlackBerry vs. Windows Phone
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies