![]() |
Quote:
|
Quote:
All that said, however, nothing prevented me from disconnecting a router in the room from its feed and forming a small LAN with no WAN connection so a group could work together on a document. During that time, they and their pristine machines were all defended from me by their own firewalls. Folks who argue against these strictures (and they are a PITA) would not consider leaving their car unlocked. |
Quote:
Just so we're clear, getting out of bed in the morning represents a risk. The real issue is risk vs reward. Attaching any computer to the network is a risk, but the Mac represents a much lower risk while increasing the reward: user performance. Of course, many IT types aren't interested in that because it doesn't do anything for them. On the contrary, a system that doesn't need to be isolated behind routers, firewalls, virus scanners and anti-spyware threatens their job security. |
Quote:
If the people who are there to fix the problems are trained on one system and x amount of images of that system (because no matter how much they know walking into a new place one needs to learn how that place does things), adding new systems also means adding more people to handle them. This means more training, more work, more policies and more money. Most places would rather hire people to do work for them that generates money over hiring people that are there to support those making the money. |
Boy what a read..
In some cases IT departments will say "NO, we do not support that so you can not have it, end of story" IT's job should be to advice and support systems to get the job done. If they feel there is an issue with some tech that may cause more problems than its worth, Then fine. Find me something that does what I need, the way I need it. Because if I can not get my job done we (IT included ) might as well all go home with our collective thumbs up our collective Arses. I do not expect your IT to understand your job, I think in most cases thats the problem. IT understand the Tech, but only superficially understand the work the companies they support do. But what should not happen is people putting in their own Wifi. I am surprised you still have a job. |
Quote:
|
People every day have to figure ways around some IT restriction to get work done, this includes IT staff
The problem with the guy putting in a Wifi, is he possibly put his company at more risk than him not being able to work on his Mac. IT's will claim some of these restrictions are in most cases due to Security. True or not true, doing what he did just proves they need to worry about people bringing in their own hardware. And gives them more Power to say what is what, because the Users can not be trusted. |
He did what he needed to do. The fact that he needed to do it shows that IT isn't doing it's job, and therefore cannot be trusted. Once again, the security claim is a red herring. If they were using secure systems, the network wouldn't be an issue. It isn't possible to infect a network, only the devices on it.
|
No, what he needed to do was go to his boss.
I'm not saying his IT are doing a good job, nor am I saying they are doing a bad one. But no where in the OP post do they say they went through any proper channels to get what he needed. Also from their own take on the situation, the IT people are more upset about the wifi than the fact he was using his PB. I think the same would go if he was using a PC laptop. I am also not only thinking about infection. With the wifi, Their network is now open to intrusion from someone off site who has nothing to do with their company but now can gain easy access by cracking the wifi. All unknown to the company because as far as they know they do not have any un-authorised wifi connected to the network. **edit** So in this case the security issue is not a red herring. And because of lack of forethought, His IT now have more power to veto anything the OP thinks they need to do to get the job done, using the security issue |
Quote:
Quote:
The network is just a bunch of wires, it's the systems on it that count. And once again, if their systems were secure they could open the network. Blocking Macs and claiming it's because of security is more than just a red herring. It's disingenuous at best. |
Quote:
I agree with mark, putting a rogue wireless device on a network is a secutrity risk. One person out of thousand who "needs" insert (Mac/PC) when everyone else is not on the platform is a red herring too. He just wants, he doesn't need. If he needed than Management should get him what he needs and if they don't it is not up to the employee to find a way around what he doesn't like. That said, "policy" should be clear as to what is expected and allow, along with the actions taken when the policy is broken. If management chooses to use one platform for all compouters, than using another platform is a security risk. If it's a one platform envirnment then that's all IT needs to know. Them not supporting platform #2 is not a lack of knowledge of IT's part, nor does it show they cannot be trusted. Lucky for me I am my own IT department and I can use which ever platform I wish. I happen to use both PC and Mac. But if you work for a company that uses a computer platform different than your own, time to learn. |
Quote:
You can't possibly believe that if the situation were reversed, with one PC on a network of hundreds or thousands of Macs, the security issue would be nearly as severe! On the contrary, it would be negligable. Quote:
The idea that "standardizing" on one platform will make things easier and more efficient has long been discredited, and only lazy IT people benefit from attempting it. The company certainly doesn't. |
My main point is that if you don't agree with company policy then you should go through the proper channels to make a change. If they refuse to change (for whatever reason) then you should live with it, keep trying to change it, or move on.
And by "Management", I mean the top management of the company, their decisions can rule of the IT department's. Taking action against the company, meaning doing what you want anyway is not the router to go, unless you like risking your job. I think this issue applies to everything not just IT. Standardizing is not necessarly the sign of "lazy IT" it chould just be a cost issue. Additional cost coming from many areas of having multiple computer platforms. And while using non-standard platform may or maynot be more efficient, but likely the deciding factor is cost. And most management looks at the cost now, not the cost overall or longterm. This is fun by the way. :) |
In my experience, very restrictive IT policies are often the result of proprietary or in-house software that will only run in Win/2000/XP. The router trick usually doesn't work either unless IT provides it because only registered MAC addresses are given an IP Address by their DHCP server. I have used a router that would spoof MAC addresses and loaded the MAC address of one of the inside participants, but that was for about an hour.
In one place I consulted, they gave me roaming rights (after I told them my MAC address), but my DHCP lease never exceeded 15 minutes (a bit of a bitch when making a presentation). A guy from IT actually came up to the conference room to look at my machine before I started. My solution to these problems, BTW, was to buy a Thinkpad T30 which I never used for anything else. |
Quote:
2. Doing your job in spite of what the IT department wants is not taking action against the company. The IT department IS NOT the company. 3. Standardizing has been discredited because it is cost-prohibitive. The security risks of standardizing alone outweigh the benefits, since a hole in one system means a hole in the entire system. Even farmers know not to plant just one type of crop. 4. Only poor management makes decisions based on the cost of the box. If you work at a company that does, you should be prepared for layoffs at any time because they're likely to happen. |
Quote:
|
Quote:
As in the OP going to their boss... Quote:
I wanted with it because the 'systems' on it are secure. I dont think so. There is no such thing as a secure system. It is only ever about how many hoops you make some one jump through and how hard you make it. Quote:
It could have been a Pocket Pc. The point is the OP introduced a weak point on the Network. They did not seek permission from anyone to be able to use a wifi connection. So how do we know they would not have got one set-up by IT Nor I suspect did seek permission to connect the 'device' to the network. Where do they say IT have Banned Macs. From what I've read, The only Mac banned was the one they brought in and plugged in without permission. Again it could have been a 'Pocket Pc' Their IT have now decided to 'Plug the hole' by banning the individual from using any device not specified or agreed to by the Company on their network. The OP now needs to go to their Bosses and explain that they can not do their job as effectively on the office Pc's as they can with their Mac. This is how you Should do things in the first place. |
I could be wrong, but the way I read this:
Quote:
Even if that isn't true, I don't buy the premise that simply adding a device to the network is a security risk. Quote:
|
I'm sorry this could go on for ever...
Whether the company bought it or not. Whether they have made the choice to only use PC, so what. I have fought the long fight to keep using Macs. I'm happy to say I see light at the end of the Tunnel. I know the issue all to well. But thats a whole Other issue. The OP should not have connected a wifi. Which is the point I am making. And you right I personally could not hack your mac from the iMac. But I believe even if your home network can not be hacked due to no services or what ever, Large companies have to allow access across the network and as secure as they maybe, they will not be invincible against attack if the attack is coming from within. Which the wifi allows. |
I understand, but the argument that Mac's aren't 100% secure misses the point. Nothing is 100% secure. Especially not the corporate approved and locked down PC. Everything is relative, and I have no doubt that a stock Mac is at least as secure than a locked down PC.
The wireless issue only came about as a way to get around an unreasonable IT department. Maybe it wasn't the best solution, but it was an attempt to get the job done. I would have used the same router, but with the wireless capabilities turned off. ;) |
| All times are GMT -5. The time now is 11:57 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2014, vBulletin Solutions, Inc.
Site design © IDG Consumer & SMB; individuals retain copyright of their postings
but consent to the possible use of their material in other areas of IDG Consumer & SMB.