SHARE
Facebook X Pinterest WhatsApp

Horror Stories of IT Management

Tech editor Carla Schroder dissects a recent article about problems with IT management. There’s plenty of finger pointing at workers, but who’s really to blame? Security fail: When trusted IT people go bad has a great title. Then it’s all downhill. I suppose it’s appropriate for an audience of managers who want cheerleading for bad […]

Written By: Carla Schroder
Feb 1, 2011
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Tech editor Carla Schroder dissects a recent article about problems with IT management. There’s plenty of finger pointing at workers, but who’s really to blame?

Security fail: When trusted IT people go bad has a great title. Then it’s all downhill. I suppose it’s appropriate for an audience of managers who want cheerleading for bad management more than good information.

It starts off with a tale of ultimate horror: not only is your trusted systems administrator selling you pirated software and incurring the wrath of the BSA (Business Software Alliance), he is running a giant porn server from the company network and stealing customer credit card numbers.

Then it takes the obligatory gratuitous swipe at “rogue” San Francisco admin Terry Childs.

Then we are introduced to Sally, ace IT person who plants logic bombs in all the servers after learning that the IT department is being outsourced to India.

The final horror: Rogue admin, in retaliation for the company busting his secret pirated satellite TV equipment business that he was running off the company’s e-commerce site, deletes the entire corporate encryption key ring even as security personnel are charging into his office shouting “Stop!” 18 staff-years of lost productivity results, because there are no backup copies.

Read the rest at Linux Planet.

 SEE ALL
ARTICLES
 

Recommended for you...

8 Best Network Monitoring Tools of 2024 (Free & Paid)
Liz Ticong
Apr 11, 2024
OpenVAS vs. Nessus: Top Vulnerability Scanners Compared
Leon Yen
Feb 23, 2024
What is SOX Compliance? Requirements & Rules
Mary Shacklett
Oct 4, 2023
The Top Intrusion Prevention Systems
Kashyap Vyas
Jun 14, 2023
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.