Your People Are Routing Around Your IT Security

Your People Are Routing Around Your IT Security

That combination of things points to one, larger, issue. There’s a pretty large communication gap between IT and business users. The security restrictions that exist are getting in the way of people getting work done, and rather than ask for them to be changed, users simply work around them using their own tools, maybe even their own laptops, or network connections, and the IT folks don’t even know this is happening.

That’s a recipe for disaster. It might be time to work on communicating with your users, and of course when I say “communicate” that absolutely means listening too.

Linked: 1 in 4 employees say they still have access to accounts from past jobs, survey finds
|

Linked: 1 in 4 employees say they still have access to accounts from past jobs, survey finds

To borrow from Cris Carter, “Come On Man!” Actually, it’s easy to blame some lazy IT folks for not disabling accounts, but I’d be willing to bet that quite a few of these are actually some third party app, or service, that the company uses, and doesn’t have a good procedure to sync up terminated…

Linked: Federal Law Won’t Protect Your Organization from Bad User Access Control Practices
|

Linked: Federal Law Won’t Protect Your Organization from Bad User Access Control Practices

If you’ve seen references to a court ruling sort of redefining the Computer Fraud and Abuse Act recently, or even if you haven’t, this paragraph from the folks at McGuire Woods boils down the real life implications pretty well.