The key's under the mat

By   Sharky, Computerworld |  Security

The process is simple enough, says the fish: Customers send client data by e-mail, the fish and his cohorts work their magic, and off to the printer it goes.

"The data is sensitive, since it routinely contains names and Social Security numbers," he says.

So it's no surprise that one customer really tries to protect the client data. "He continually sends the data in password-protected zip files," fish says, "and never returns calls for the password."

Fortunately for the client, that's not the punch line.

"They also include all the file information as the body text of each e-mail -- where it is, of course, totally nonsecure," says the fish. "We cut and paste it so we can do our work."

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness