Security Basics mailing list archives
Re: Securing workstations from IT guys
From: "Michael R. Martinez" <mike () security-bounce com>
Date: Wed, 28 Nov 2007 23:11:03 +0000
There has got to be a better way than taking an investigation out on all employees. Have you identified any IP addresses that are creeping on your clipping levels, what exactly are you trying to do? Do you feel corporate espionage is occuring? There are so many ways to catch someone doing the wrong thing, but don't you feel that ultimately if end users are doing the wrong thing that it is up to you as the security guy to put in place the appropriate controls and preventitive measures to prevent this. In my opinion this is going to be far to time consuming wasting good time like this when proper planning and controls could have been put in place. This I wouldn't even consider because there are many laws that protect employees from this behavior. In one case the judge ruled that employees do have rights to privacy and an employer should let employees know that their systems are monitored and that the employee agrees to those terms of privacy being revoked, smyth v. Pillsbury. Just my two cents! Michael R. Martinez TF: 800-987-7307 -----Original Message----- From: "Nick Vaernhoej" <nick.vaernhoej () capitalcardservices com> Date: Wed, 28 Nov 2007 10:10:27 To:"security-basics" <security-basics () securityfocus com> Subject: FW: Securing workstations from IT guys A key logger? At what point are we crossing the line of common decency towards co-workers? This with the understanding that the person snooping in HR material is a scumbag, however, the remaining innocent PC's of the pool in question will be receiving the same treatment. I realize it is company property and all, but if you log access to sensitive files and audit these logs do you really need to be more intrusive? This is not an attack, more a tagged on question to everyone? Is keystroke logging commonly accepted by you within a corporate setting? Nick Vaernhoej "Quidquid latine dictum sit, altum sonatur." -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Vandenberg, Robert Sent: Tuesday, November 27, 2007 11:18 AM To: security-basics Subject: RE: Securing workstations from IT guys Those are good points. I would recommend that you put in a keystroke logger program with the written approval of your upper management on the PCs in question and then download the logs each day. That way you are able to create a forensics "e-Trail" that can be used to confront/counsel/etc. them. I would also make sure that you look at your documenation and ensure that each IT person has signed a document stating that they will not use their abilities improperly. Combine those two and you have a means of pursuing them legally. This electronic transmission is intended for the addressee (s) named above. It contains information that is privileged, confidential, or otherwise protected from use and disclosure. If you are not the intended recipient you are hereby notified that any review, disclosure, copy, or dissemination of this transmission or the taking of any action in reliance on its contents, or other use is strictly prohibited. If you have received this transmission in error, please notify the sender that this message was received in error and then delete this message. Thank you.
Current thread:
- RE: Securing workstations from IT guys, (continued)
- RE: Securing workstations from IT guys Craig Wright (Nov 28)
- Re: Securing workstations from IT guys cc (Nov 29)
- Re: Securing workstations from IT guys krymson (Nov 26)
- Re: Securing workstations from IT guys rohnskii (Nov 26)
- Re: RE: Securing workstations from IT guys kurt . kessler (Nov 27)
- RE: RE: Securing workstations from IT guys David Gillett (Nov 27)
- Re: Re: Securing workstations from IT guys bert . knabe (Nov 27)
- Re: Securing workstations from IT guys Bob (Nov 28)
- Re: Securing workstations from IT guys stuff (Nov 28)
- FW: Securing workstations from IT guys Nick Vaernhoej (Nov 28)
- Re: Securing workstations from IT guys Michael R. Martinez (Nov 28)
- Re: FW: Securing workstations from IT guys Jan Heisterkamp (Nov 29)
- RE: FW: Securing workstations from IT guys Worrell, Brian (Nov 29)
- RE: FW: Securing workstations from IT guys Craig Wright (Nov 29)
- RE: FW: Securing workstations from IT guys Eric White (Nov 29)
- RE: FW: Securing workstations from IT guys Craig Wright (Nov 29)