Bottom line? IT resources are prey to snooping, pilfering, and invading forces, sometimes ones lurking inside the company!
The one I'm waiting for? Iron Mountain tapes hidden in a pumpkin patch.
Mary Jander, Site Editor, Byte and Switch
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.