Honor 9 Lite review
If you run your own business, and you're contemplating making people redundant in the current economic climate you might want to read this:
It seems that 'insider attacks' are on the increase.
This is something I've been very aware of for a long time after a temp worker tried to sabotage my business.
The person turned out to be in urgent need of treatment. This was not immediately obvious but in the short time he was employed, he managed to destroy quite a lot of important files. Fortunately, I had backups and hard copy versions of the work but, even so, it took quite a lot of effort to properly get going again.
This is the reason I have such an interest in backups and the belt, braces and safety pins attitude I have towards preserving and important data
I believe that some food preparation companies, when they sack somebody, escort them from the premises immediately.
Certainly don't want a real P** Soup!! Seriously though this is just the same as 'burglary on the increase' only difference being that it for the computer literate.
A lot of companies do that for fairly obvious reasons.
In one job I was escorted off the premises, then I received the contents of my desk by courier the next day.
The nice girl who packaged my personal belongings literally gave me everything off the desk, including some purchasing files and the laptop PSU, no laptop though as the IT guy had taken that to wipe the drive but left the PSU...
that have occurred over the past few months. In one case an employee was furious because she had been unsuccessful in her attempt to get a promotion, and she sent a copy of the company's customer database - complete with annual spend information - to her boyfriend. Unfortunately for her she sent it to his office when he was in a meeting. His boss picked it up and blew the whistle on her.
It's no surprise to me to learn that these incidents are on the increase of late.
"I believe that some food preparation companies, when they sack somebody, escort them from the premises immediately."
Exactly what happens at the abattoir where I work.
Not quite a serious, but a very annoying incident that caused me a large amount of work.
A lad who had been stealing from me, so I sacked him.
The trouble was, he guessed that he was on his way out, so he logged into a PC and changed the bin location for every product in the system to the top floor of the warehouse. This meant all the order slips printed on the top floor.
It took a team 40 hours, non stop, to list all 8500 products, by location then input them individually.
After this incident we got our IT team to change the software to impose a limit of 50 lines to batch bin location changes...
Although I don't condone it I can understand how some people could do it, especially if they have given many years loyal service to a company and then thrown on the scrapheap or a new company takes over and treat you like s*** and you just know they want their own people in
I was made to be aware of insider attacks some years back when I worked in a defence related industry. They tended to happen. Our biggest worry was the potential that somebody might leave a 'time bomb' in the system. We had heard of this happening (in another department) when a dismissed employee stated that if he wasn't in the office on a regular basis to reset the 'time bomb', it would run and cause untold damage to the system and files. Immediate escorts and the such were always a part of standard procedures to cover everything else. Bringing any form of recordable into, or out of, the area was a disciplinary offence (though this was in the days before easy internet access and usage).
Since then, I always made as sure as I could that there were systems to try to avoid such happenings - and good data back ups just in case anything did happen.
My probable paranoia was such that later in life, to avoid potential data damage by a younger member of the family, my pc and data at home were security protected.
In one case, things really did work out in my favour! I was involved in a business venture, with another guy, where I was responsible for generating some Excel spreadsheet and Access database applications for sale. Of course, I protected the code pages to avoid end users messing things up (or stealing my absolutely brilliant ideas for macros and modules ;-)) ).
That action actually helped in a sideways manner, eventually, when we ended up some distance apart. I used to get regular emails from him requesting assistance when an end user had mucked things up (RTM comes to mind.). I also seemed to get little in the way of remuneration for my share of the profits on the packages sold.
So, in the end, I suggested that he buy the complete copyright on the packages, pay up what I was owed and then arrange an alternative software support. It worked. I got back payments, a fee to allow him copyright ownership and no more awkward messages.
I was glad that I had good security systems in place and always stay paranoid about keeping things that way - even though I am now single and on my own.
This thread is now locked and can not be replied to.