55
submitted 2 years ago by [email protected] to c/[email protected]
you are viewing a single comment's thread
view the rest of the comments
[-] [email protected] 9 points 2 years ago
[-] [email protected] 14 points 2 years ago

This is probably worth believing.

Fortunately, intelligence is a thing that goes steadily out-of-date as time passes. Also, once you know something has been compromised, you can take steps to significantly mitigate the damage.

[-] [email protected] 10 points 2 years ago

I don't believe it, because I work in IT for decades and by now, above a certain level of confidence, the only way for vital information to be shared with wrong recipients can't be accidental. Years-long "accidental" proceder couldn't go unobserved. Too many people involved, too many IT-relevant security measures in the action.

[-] [email protected] 3 points 2 years ago* (last edited 2 years ago)

Have you met any of the big IT supply subcontractors?

Many have built a business around highly specific contracts, the expectation is the service level agreements are technically met. Anything outside the contract is irrelevant and will not be done until a contract is in place. This is reflected in the culture of its staff.

For example if you raised a problem and a team had a 24 hour SLA, the team is focussed on closing the ticket within 24 hours, so they will look for a reason to close the ticket. If you outlined a problem and suggested the issue might be in X area, they will declare "User stated a problem in X, X dashboard is green" and close the ticket. 24 Hour SLA Met!

It might take you 20+ tickets before your actual problem is resolved but from their perspective that was 20+ tickets all completed within 24 hour SLA and that is the metric reported in the contact.

If you try and expose the fact it took 20 days to resolve your problem, staff in these organisations will close ranks to protect each other and the business will protect them on the basis it undermines the metrics for the contract.

It really isn't surprising

[-] [email protected] -1 points 2 years ago

You sound like you think there are only humans working on local IT security and that it's ticket-based model.

load more comments (13 replies)
load more comments (13 replies)
load more comments (13 replies)
this post was submitted on 21 Jul 2023
55 points (95.1% liked)

worldnews

5358 readers
1 users here now

Rules:

  1. Be civil. Disagreements happen, that does not give you the right to personally insult each other.

  2. No racism or bigotry.

  3. Posts from sources that aren't known to be incredibly biased for either side of the spectrum are preferred. If this is not an option, you may post from whatever source you have as long as it is relevant to this community.

  4. Post titles should be the same as the article title.

  5. No spam, self-promotion, or trolling.

Instance-wide rules always apply.

founded 2 years ago
MODERATORS