Network security pilot fish is working for a big publishing company when something genuinely disturbing turns up in an audit.
"I found over a million files that could be rewritten by almost anyone," says fish. "This was the result of the habit at the time of people just sharing the root of the C: drive. There were hundreds of files with names suggestive of sensitive data: review, projection, budget, forecast, etc.
"In addition to writing up the audit report, which was largely ignored, I added a sort of humorous test by creating a folder within the HR server titled 'If you find this folder, call (555) 555-0100' -- my personal cell phone number.
"The audit came and went. A couple years went by and I was laid off.
"Three years after I was laid off, someone finally called me and said, 'I found a folder name that said to call this number.'
"Once I explained, we both had a laugh over how long it took for that to be noticed."
Don't call Sharky -- use email. Send me your true tale of IT life at firstname.lastname@example.org. You'll score a sharp Shark shirt if I use it. Add your comments below, and read some great old tales in the Sharkives.
Get your daily dose of out-takes from the IT Theater of the Absurd delivered directly to your Inbox. Subscribe now to the Daily Shark Newsletter.