Ah, security -- it's a constant issue for tech pros. But preventing security breaches from the outside is one thing. What about the bad apples inside the company ranks that wreak havoc in other ways? Was "sleuth" part of the IT job description?
Here are a handful of stories from the Off the Record archives that are written by tech pros about their memorable experiences dealing with missing tech inventory or other shady dealings in the workplace. It may seem surprising that these code jockeys and system admins would take to detective work so readily, but when you think about it, it's not so far removed from tracking down bugs in code or troubleshooting a faulty server. At the end of the day, it's all about solving problems -- an IT specialty.
[ If you want to cash in on your IT experiences by publishing a story in the Off the Record blog, send it to email@example.com. InfoWorld is looking for your amazing or amusing IT adventure, such as managing IT, developing apps, supporting users, times when IT and business expectations collide, or even a lesson learned -- stories that are memorable to you. If we publish it, we'll keep you anonymous and send you a $50 American Express gift cheque. ]
- "When someone is stealing your hardware." To catch a thief, an IT manager becomes a private investigator. Too bad no one was willing to listen.
- "No peeking!" A techie yields to temptation to look at audit results and gets fired. But his boss' transgressions were far worse.
- "Crime might pay, but only in volume." Employees-turned-thieves take advantage of an IT director's apathy and the hapless office culture.
- "Who can you trust?" The guy who controlled the purse strings had a little too much say on purchases and returns -- wonder why?
- "Wach out for billing scams ... and slimy managers." What can you do when a slightly sleazy deal starts to slide deeper into the fertilizer?
- "A tale of a database-turned-detective." A data entry error and the "overkill" fix demanded by top brass unearths a surprising secret.
This story, "Tech thieves and dishonest dealings redefine network security" was originally published at InfoWorld.com. Read more crazy-but-true stories in the anonymous Off the Record blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.