Businesses rely heavily on their IT systems and digital data to keep running.

However, with this dependence comes the risk of cybersecurity threats, and a company’s IT person is often the first line of defense. While most IT personnel have good intentions, there may be a few bad apples who may compromise your company’s data security.

From an entry in the New York Times Business Blog, an anonymous reader writes about their experience with an I.T. “professional”. 

 

“The new I.T. director at my large, international office is a rude, condescending jerk. We’ve been through years without any I.T. leadership – the previous ones quit or disappeared – so our infrastructure has run amok, and he has a big job to do.

 

But he lacks serious people skills, at least around me. In conference calls, he has openly accused me of various transgressions, like how large my files are supposedly causing backup problems. He laughs at my serious comments or questions. And he has threatened to delete my folders or charge me an outrageous cost to put it on the cloud. I have told his staff how unpleasant this is for me, but they shrugged it off.

 

What do I tell H.R. – that he’s just a lout? I suspect upper management doesn’t want anyone to rock the boat after years of I.T. chaos. The problem is, this guy wields huge power over my work and data. If I don’t have I.T., I might as well go home and do analyses with my calculator.” – Washington, D.C.

 

Does this sound like your company’s situation with the I.T. staff? You’re not alone. This is becoming an increasingly common problem. But how do you put your foot down? How do you prevent an I.T. Employee from being the sole person that can provide access to your data? 

 

In today’s interconnected and technologically-driven world, businesses rely heavily on their IT systems and digital data to keep running. However, with this dependence comes the risk of cybersecurity threats, and a company’s IT person is often the first line of defense. While most IT personnel have good intentions, there may be a few bad apples who may compromise your company’s data security. Here are some red flags to watch out for that your company data may not be safe with your IT person.

 

1. Unusual behavior: Any unusual behavior or out-of-character actions by an IT person should be noted. It could be as simple as an IT person working after hours without authorization or regularly accessing data they should not be accessing.

 

2. No or limited documentation: A competent IT person should have proper documentation of your company’s IT infrastructure and processes. The absence of proper documentation or limited access to it can be a red flag that your IT person may not be doing their job correctly.

 

3. Poor performance: Consistently missing deadlines, failing to follow up on issues, or providing inadequate solutions can be warning signs that your IT person is not doing their job correctly.

 

4. Unauthorized access: If an IT person accesses data they are not authorized to access, it could be a sign that they are attempting to breach your company’s data security. This may include accessing sensitive customer information or financial data.

 

5. Refusal to share passwords or access: A refusal to share passwords or access to IT systems or software can be a warning sign that your IT person may have something to hide.

 

6. High staff turnover: If the company’s IT department has experienced high staff turnover, it could be a sign that there are issues with your IT person or the IT department as a whole.

 

7. Unexplained data loss: If your company is experiencing unexplained data loss, it could be a sign that your IT person is intentionally deleting files or data.

 

In conclusion, keeping your company’s data safe is crucial, and IT personnel play a vital role in ensuring that data is secure. However, it’s essential to be aware of the red flags that your IT person may not be trustworthy or competent. If any of these warning signs apply to your IT person, it’s time to take action to protect your company’s data and security. This may include hiring a third-party IT audit or fully managed IT company to assess your company’s IT infrastructure and help you develop a robust IT security plan.

Keep your company running with a Fully Managed IT Staff!

Growth Mode Technologies offers IT staffing, a focus on cyber security measures and more! Check out our services guide or contact us at sales@growthmodetech.com.

Phone: 315.333.0999

Read More: