• cley_faye@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    16 hours ago

    IT admins (and those involved in a company’s security) should be fired for deploying under-configured or misconfigured Windows installations on computers.

    I kinda want to see you argue this one. With pop-corn.

    • Michael@slrpnk.net
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      edit-2
      15 hours ago

      There is a high skill level needed to configure Windows properly in enterprise settings. Regardless, I wouldn’t be working for an organization that trusts any Microsoft software.

      Keep your popcorn ready though, it’s only a matter of time before Microsoft loses the security battle - unless Microsoft makes gigantic strides in a more sustainable direction.

      • cley_faye@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        6 hours ago

        Irrelevant. The defense of “they should do better” will do jack to prevent the firing of someone that willfully circumvented company policy.

        • Michael@slrpnk.net
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          5 hours ago

          I think their performance is relevant. Why would an employee be able to easily run an unknown binary from the internet to begin with? If the systems were properly configured to block this, there would be no issue. If I were an executive, I would absolutely be looking at my IT team in this case.

          If the employee went entirely out of their way to run an unknown binary, bypassing OS-level restrictions, and sidestepping established procedures - then the employee should be fired.