The key's under the mat

The process is simple enough, says the fish: Customers send client data by e-mail, the fish and his cohorts work their magic, and off to the printer it goes.

"The data is sensitive, since it routinely contains names and Social Security numbers," he says.

So it's no surprise that one customer really tries to protect the client data. "He continually sends the data in password-protected zip files," fish says, "and never returns calls for the password."

Fortunately for the client, that's not the punch line.

"They also include all the file information as the body text of each e-mail -- where it is, of course, totally nonsecure," says the fish. "We cut and paste it so we can do our work."

This story, "The key's under the mat" was originally published by Computerworld.

From CIO: 8 Free Online Courses to Grow Your Tech Skills
Join the discussion
Be the first to comment on this article. Our Commenting Policies