Conflict is as much a part of human nature as much as eating and sleeping are. It’s an instinct, embedded deep into the primordial, animal side of our brain. And in every conflict there are two sides: the one that is attacking and the one that is reacting to that attack. The side that adapts faster is the one that wins.
Attackers will set an objective for themselves and they will probe and prod at their victim’s defenses until they punch through. In turn, defenders need to anticipate the attacker’s goal and focus their efforts and resources in to preventing the attacker’s success. It a good old fashion arms race and these basic mechanics of combat are the reason why attacking is considered far easier than defending. Continue reading →
An individual cannot really hope to match the IT resources that a company has at its disposal. The only domain where an individual is likely to get the better of a company is in individual hardware configuration. The general office workstation is usually a middle section performance machine, designed to handle a minimum of operating tasks and can’t really compare to a home computer tweaked for performance with a custom configuration. Even so, he will lose a fight with one of the specialized company computers, those meant to handle video and image editing, like the ones in the design department or in marketing.
Because of this, a company’s IT assets can represent a real gold mine for some employees. Sooner or later, they might realize that his employer’s servers and internet bandwidth are exactly what they always needed for their personal use but could never afford. His community forum, his upload mirrors or even a torrent site could really thrive in this lush and luxurious new environment.
As such, you could easily find out that your company’s IT assets have been used to host private services. Continue reading →
In the Age of Computers, clandestine software is one of the biggest risks for a company.
The software we are talking about is not a virus that breaches your network defenses and quietly infiltrates your office computers. A far greater problem is the involuntary inside job – careless piracy.
The reasons can vary and are numerous, but the reality is that some employees install or store pirated software on office computers. This can be caused by management offering inadequate resources, independent employee activities or simply personal quirks (the company has a license purchase for Adobe’s Photoshop but I’m used to using Corel’s Painter.) And while this kind of copyright infringement doesn’t sound like it should concern the company, it most definitely does. Continue reading →