NEWS: Wall Street Journal tells your end users how to get around IT policy

As if, Walt Mossberg wasn’t sketchy enough ("iPhone is a breakthrough", "Windows Vista has little value", etc.) now we’ve got some floozy from the Wall Street Journal telling end users how to bypass your company’s IT Security & Usage policies. 

Check out the things that the WSJ tells your customers how to do in a recent article:

  1. How to send giant files
  2. How to use software that your company won’t let you download
  3. How to visit the web sites your company blocks
  4. How to clear your tracks on your work laptop
  5. How to search for your work documents at home
  6. How to store work files online
  7. How to keep your privacy when using web email
  8. How to access your work email remotely when your company won’t spring for a Blackberry
  9. How to access your personal email on your Blackberry
  10. How to look like you’re working

For a supposed business-oriented publication, I’m really skeptical as to the author’s motives. 

  • GO AHEAD… PUT YOUR COMPANY AT RISK!
    WSJ is encouraging behavior that violates most corporate information security policies.  While there are other far lesser known sites that describe stuff like this, none are as well-known or well respected as the WSJ.  If I didn’t know any better, I’d say that the author was a shill for people that produce software like Authentica or our own Rights Management Services to encrypt documents and enforce policy restrictions on them.
  • WE NEED MORE ADVERTISING HITS
    People like John C. Dvorak use link-baiting tactics like these to create trackbacks to their site to grow the hit count of their web site equally importantly, create controversy over a topic that they originate to make themselves relevant.  While Dvorak can do this sort of thing because, well, you don’t exactly expect WSJ quality journalism from him.
  • WHAT ABOUT THESE TOPICS, WSJ?
    I get the feeling like WSJ, similar to the rebellious drug-laden hippies of the 70’s, think they’re "just keepin’ the man from oppressing the peeps" by breaking company rules.  Great – so if the WSJ thinks bypassing security protocol for America’s companies is "just fine" – so much so that they advocate it, what about these lovely topics:
    – How to get away violations of HR policies
    – How to use company office supplies for your own purposes
    – How to moonlight for another job during work hours

When I think about the creation of this article, I can only think of a quota from Jeff Goldblum’s character Ian Malcolm, in Jurassic Park: 

"<They> were so preoccupied with whether or not they could, they didn’t stop to think if they should."

And NO, I’m not going to link to the page or name the author.  They don’t need the publicity.  If you want the URL, search for it, or contact me and I’ll send it to you. 

In other news:  One of my future posts will be entitled:

"Ten ways for IT to express it’s displeasure with a newspaper journalist"

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: