Employee incompetence is a hacker’s best friend

analysis
Mar 9, 20112 mins

Tech stories of data vulnerabilities caused by incompetence and overlooked details by executives, IT managers, or admins

Security breaches — they’re an IT issue that’s difficult to prevent completely, but even harder when the threats develop from the inside, whether it’s hardware stolen by dishonest employees or data loss caused by oversight within the ranks.

How does a techie deal with security issues effectively when executives, IT managers, or fellow admins don’t take the necessary precautions? Bureaucracy and incompetence make for tricky situations.

[ Do you have an IT security story to share in InfoWorld’s Off the Record blog? Send it to offtherecord@infoworld.com. | Read Off the Record stories of stolen hardware and other dishonest dealings. | For more security insights, check out Roger A. Grimes’ Security Adviser blog on InfoWorld. ]

Here are a handful of stories from the Off the Record archives that are written by tech pros about their memorable experiences dealing with security vulnerabilities that could have been prevented. Security technology and procedures may change, but handling users’ security misunderstandings or oversights does not.

This story, “Employee incompetence is a hacker’s best friend” was originally published at InfoWorld.com. Read more crazy-but-true stories in the anonymous Off the Record blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.

infoworld_anonymous

Since 2005, IT pros have shared anonymous tech stories of blunders, blowhard bosses, users, tech challenges, and other memorable experiences. Send your story to offtherecord@infoworld.com, and if we publish it in the Off the Record blog we'll send you a $50 American Express gift card -- and, of course, keep you anonymous. (Note that by submitting a story to InfoWorld, you give InfoWorld Media Group, its affiliates, and licensees the right to republish this material in any medium in any language. You retain the copyright to your work and may also publish it without restriction.)

More from this author