contractor sabotage

original publish date: 20th December, 2009

decades on …

This used to be such a thing. Laptops (and peripherals like screens and docking stations) were seen as a significant expense, and security frameworks struggled to consider nuanced access by outside agents.

A decade and a half later, things seem a lot better, at least until you have to exchange large files. Then you might as well be faxing.

transcript

Contractor: You don’t provide computers to contractors and using my own laptop breaches your security policy. How can I do any work?

Internal: That is not my problem, Hotshot.

Closing caption: Ever wondered why your internal staff outperform (sic) your highly paid contractors?

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *