While we fire the boss, can you lock him out of the network? The Register

On Call Welcome once more, dear reader, to On Call, The Register's weekly reader-contributed column detailing the delights and dangers of working in tech support.
Their evidence for the allegation was temp files that showed the engineer's account had been used to open certain documents he had no business seeing - never mind reading as thoroughly as the metadata trail indicated.
Alvin was asked to sit in on a disciplinary meeting, in which he would share his opinion that the temp files were damning evidence.
The intended outcome was a severe wrist-slap that left the engineer chastened, but happy to continue his important contribution.
Alvin's advice was that this approach was not sufficient.
The org had lost confidence in a critical employee and would never be able to trust him again.
The biz countered that the engineer had done good work for years, and had built the network from scratch.
Dismissal would mean losing important corporate memory.
Alvin responded that an untrustworthy employee should not be retained, and won the day.
So a plan was hatched: while HR fired the engineer, Alvin would revoke his network access to ensure no revenge could be wreaked.
To make that possible, Alvin was provided with network credentials that let him plan the deed.
As he rummaged around the network, he found a VPN connecting to what looked like a residential address.
At that address he found half a dozen servers laden with company files.
The engineer was duly let go, under an agreement that ensured the backup servers were handed over.
All passwords were then changed and the business carried on - just without its network engineer.
After a time Alvin was asked why the org's network was running so slowly.
The former engineer had throttled the bandwidth on the company's account.
Not to mention confirming that firing the engineer was the right course of action.


This Cyber News was published on go.theregister.com. Publication date: Fri, 12 Jan 2024 09:13:12 +0000


Cyber News related to While we fire the boss, can you lock him out of the network? The Register

CVE-2021-47038 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: avoid deadlock between hci_dev->lock and socket lock Commit eab2404ba798 ("Bluetooth: Add BT_PHY socket option") added a dependency between socket lock and hci_dev->lock ...
4 months ago Tenable.com
How to lock a file or folder in MacOS Finder - Of course, when you have those types of sensitive documents, you'd want them stored more securely than within a locked file. If the files are less sensitive yet you still don't want anyone monkeying with them, MacOS Finder has a feature that can help ...
5 months ago Zdnet.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
Space Force boss warns 'the US will lose' in orbit The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
CVE-2011-2263 - Unspecified vulnerability in Sun Integrated Lights Out Manager in Oracle SysFW 8.0.3.b or earlier for various Oracle SPARC T3, SPARC Netra T3, Sun Blade, and Sun Fire servers allows local users to affect confidentiality via unknown vectors. Per: ...
12 years ago
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
6 months ago Esecurityplanet.com
Choosing the Perfect Smart Lock for Your Home Security - Installing a smart lock on your home is like building a wall of protection around it. In this article, we will explore the benefits of using smart locks, different types of technology available, security features offered, factors to consider when ...
6 months ago Securityzap.com
Fake e-commerce network scams $50M from Euro, Oz, US buyers The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Theregister.com
TeamViewer responds to security 'irregularity' in IT network The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 week ago Go.theregister.com
TeamViewer confirms Russia broke into its corp IT network The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
6 days ago Go.theregister.com
UK's attitude to security spotlit by government figures The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
US insurers using drones to deny home insurance policies The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Packetstormsecurity.com
Palo Alto Networks to fix exploited GlobalProtect zero-day The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
Identifying third-party risk The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
CISA warns of critical vulnerability in Chirp smart locks The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
US senator calls for China EV ban The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Theregister.com
Accused of stealing $3.5M to mine under $1M in crypto The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
MGM sues FTC to halt probe into ransomware infection The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
Cisco: Duo MFA details leaked and VPNs getting hit hard The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
Japanese government rejects Yahoo's plan to fix security The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
2 months ago Go.theregister.com
Ex-White House election threat hunter on 2024 challenges The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com
Attack makes autonomous vehicle tech ignore road signs The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Theregister.com
Critical infrastructure security needs everyone's help The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com
Ransomware negotiator weighs in on the payment debate The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 month ago Go.theregister.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)