From the Trenches: Worst IT Mistakes, Part 3

Posted: April 26, 2012 in Industry Commentary, Rethink Remote Access
Tags: , ,
By Chuck Romano
Concluding my series about the worst IT mistakes I’ve witnessed in my 10+ years as a technician, I’ll highlight two notable IT atrocities I’ve seen people make. So let’s dive right in:
  • Not Logging Off the Remote Network

Remote desktop applications enable easy access to the corporate network, but failing to log out of a session can wreak havoc, leaving a connection to a corporate network wide-open to anyone who happens upon the device, not to mention if the user starts to wonder into the shady depths of the internet unknowing still connected to a company network that can be at risk of malicious data.

  • Ignoring the Social Engineering Threat

All the greatest security technology in the world is no match for good social engineering tactics.  Millions of dollars can be spent to prevent hackers from compromising a system, yet a simple phishing techniques can easily hand over passwords over to the bad guys (or gals).  Social engineering is an all around security threat, not just a remote access threat, but again, with the high usage of mobile devices in public places, a simple “over-the-shoulder” technique can compromise an entire network.

Anybody else have “war stories” to share? I’d like to hear about it in the comments.

Chuck Romano is owner of MoonCat Computer Repair and has more than 10 years experience in the IT sector.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s