Of course it's all secure -- we do audits

Network security pilot fish is working for a big publishing company when something genuinely disturbing turns up in an audit.

"I found over a million files that could be rewritten by almost anyone," says fish. "This was the result of the habit at the time of people just sharing the root of the C: drive. There were hundreds of files with names suggestive of sensitive data: review, projection, budget, forecast, etc.

"In addition to writing up the audit report, which was largely ignored, I added a sort of humorous test by creating a folder within the HR server titled 'If you find this folder, call (555) 555-0100' -- my personal cell phone number.

"The audit came and went. A couple years went by and I was laid off.

"Three years after I was laid off, someone finally called me and said, 'I found a folder name that said to call this number.'

"Once I explained, we both had a laugh over how long it took for that to be noticed."

Don't call Sharky -- use email. Send me your true tale of IT life at sharky@computerworld.com. You'll score a sharp Shark shirt if I use it. Add your comments below, and read some great old tales in the Sharkives.

Get your daily dose of out-takes from the IT Theater of the Absurd delivered directly to your Inbox. Subscribe now to the Daily Shark Newsletter.

To express your thoughts on Computerworld content, visit Computerworld's Facebook page, LinkedIn page and Twitter stream.
Windows 10 annoyances and solutions
Shop Tech Products at Amazon
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.