For any of us who have ever complained about an employer/IT department controlling what sites you may/may not access from your work computer, this article from InsideTech.com is quite eye-opening. Detailed schematics of President Obama's top secret helicopter were found on an Iranian IP address.
Mr. Boback (CEO of security group Tiversa) believes the leak may be innocent in nature. He points out that many file sharing programs automatically share the contents of your entire hard drive. The employee may merely have downloaded a P2P client to download music and videos and ended up unwittingly leaking the highly confidential information on Marine One. Says Mr. Boback, “When downloading one of these file-sharing programs, you are effectively allowing others around the world to access your hard drive.”
I would hate to explain any of that on my next job interview.
Freely flowing information empowers us as individuals and joins us to the collective consciousness of humanity, but to quote Uncle Ben, "With great power comes great responsibility."
___________________________________________________________
Posted to THE NATIONAL NETWORKER. To subscribe for your free newsletter, go to www.TheNationalNetworker.com. For the complete National Networker Relationship Capital Toolkit and a free, continuous RSS feed (available either by traditional RSS or by direct email), go to: http://thenationalnetworkerweblog.blogspot.com. You are also invited to click our buttons:
Forward/Share This Article With Colleagues And Social Media:
1 comment:
Dear Wendy:
My great compliments on your excellent but frightening post. Apparently, the last private sanctuary and respository secrets is your own mind.
I will no longer use Uncle Ben's products (I had been particularly found of his Long Grain Rice)...
On a serious note -- what this tells us all as networkers is that, when emailing, posting or communicating via computer, you are ALWAYS ON RECORD. If you bear this truth in mind, 1) your posts will generally be of better informational quality, and more coarefully conceived, and 2) they will not be used to create blowback, backlash, security or prosecutorial problems for you.
Again, my compliments!
Faithfully,
Douglas Castle
http://TakingCommand.blogspot.com
p.s. Please send any reposes to this comment right to this post. Thanks.
Post a Comment