Should IT-technologies be banned in the office?
Every office worker knows that the normal operation of a modern enterprise is impossible without computers, the Internet and licensed software. But when a virus appears in the office server, then everyone clings to his head: “Damn the Internet! It would be better if he didn’t exist at all! ” But the Internet is a tool, the same as an ax. One man with an ax builds Kizhi, and the other becomes Raskolnikov. Tools should be used with care, observing safety precautions, and – in the right place and at the right time. It happens that the problem is not in the “infected” Internet at all … I will tell you a “scary” story. True, in accordance with all the canons of horror, it will end well … or almost well, but first … In general, the story. ₽ Free 14 day course! It all started with a good one (like any classic horror movie – the sun shines first, and then Freddy Krueger appears). So, it all started with the general computerization of the office. A week later, the director found that employees began to delay more often after work. Good! So they are rooting for the cause. Soon, profits will rush uncontrollably. But another week passed, no additional profit was observed, but a strange tendency emerged: to obtain a certificate on the state of a particular indicator, it takes not 5–10 minutes, as before, but at least half an hour, and you still have to remind the performers that here it is, the bosses, everything is in standby mode, it is already grinding its teeth. And the conversations between the employees! It’s as if they are not talking in Russian. One day before dinner, the company’s lawyer stopped the chief accountant in the hallway and uttered a mysterious phrase: “We are with Grisha for the cops, you and Olga Stepanovna are for the bandits. We start in five minutes, ”after which the two“ residents ”quickly dispersed to their offices, and the director, who was an unwitting witness to the conversation, remained completely at a loss. Of course, the director had heard about computer games and chatty portals on the Internet. Moreover, he even knew such a buzzword as “porn site”. However, a random check of employees, expressed in unexpected visits to their workplaces, did not reveal any crime. Everyone was enthusiastically involved in work, on all monitors – exclusively working documents: contracts, accounting reports, certificates, presentation drafts. In such turbulent times, a real nuisance occurred: the breakdown of negotiations with a foreign company. The labors of several months have disappeared. The intuition of the director suggested that everything went not to the tail, but to the computer – under the system unit. But how? The system administrator was called to answer. The next morning, office computers were greeted with the Remote Administrator program. Under normal conditions, this program is designed to change the operating system settings of any computer on the local network from the system administrator’s computer over the network or even over the Internet. In this case, it was used to monitor network computers from the director’s computer. After half an hour studying the monitor, everything became clear. Almost all computers had toys, ranging from simple solitaire games to strategies. Employees of the legal and financial departments chased each other in virtual construction, some for the Cops, others for the Bandits. Some employees chatted enthusiastically on the Internet using ICQ or QIP. Of course, in such a tense atmosphere, no one could think of work. In addition, a server check revealed that the Trojan and Back Door programs known for their meanness were reliably registered in it. The former are designed for simple sabotage work on victim computers, such as stealing passwords and documents and sending them via the Internet to their masters to fake email addresses. The programs of the second Back Door series are much more insidious; they enable its owner to use the victim computer as his own, similar to the legally installed Remote Administrator program. In the list of unauthorized communication sessions and sending letters, documents were found on frustrated negotiations. The Hamletian question “To be or not to be?” Appears. If computers have only done harm, then maybe it’s better to abandon them? Prohibit the use of the Internet, hand out calculators and typewriters to employees? The answer is clear: no! In the modern world of speeds and sophisticated information technologies, one cannot stay away from progress. It is impossible to compete and develop normally without modern means of communication and electronics, you can talk a lot about this and bring a lot of arguments. But how not to get into a situation similar to that described? In this company from the very beginning a number of mistakes were made. Firstly, the system administrator was required to reinstall all operating systems from licensed disks as soon as an acceptance certificate was signed with the supplier company – this would guarantee the removal of unauthorized programs, if any, were installed by the supplier’s employees.