Office Technology Ten Things Your IT Department Won't Tell You

Admit it: For many of us, our work computer is a home away from home.

It seems only fair, since our home computer is typically an office away from the office. So in between typing up reports and poring over spreadsheets, we use our office PCs to keep up with our lives. We do birthday shopping, check out funny clips on YouTube and catch up with friends by email or instant message.

And often it's just easier to accomplish certain tasks using consumer technology than using the sometimes clunky office technology our company gives us -- compare Gmail with a corporate email account.

There's only one problem with what we're doing: Our employers sometimes don't like it. Partly, they want us to work while we're at work. And partly, they're afraid that what we're doing compromises the company's computer network -- putting the company at risk in a host of ways. So they've asked their information-technology departments to block us from bringing our home to work.

End of story? Not so fast. To find out whether it's possible to get around the IT departments, we asked Web experts for some advice. Specifically, we asked them to find the top 10 secrets our IT departments don't want us to know. How to surf to blocked sites without leaving any traces, for instance, or carry on instant-message chats without having to download software.

But, to keep everybody honest, we also turned to security pros to learn just what chances we take by doing an end run around the IT department.

For hacking advice, we asked Gina Trapani, editor of Lifehacker.com, an online guide to being more productive on the Web; Leon Ho, editor of Lifehack.org, a blog with a similar mission; and Mark Frauenfelder, founder of the wide-ranging blog BoingBoing.net and editor of the do-it-yourself technology magazine Make.

To find out the risks, we talked to three experts who make a living helping IT departments make the rules and track down the rogue employees who break them. They are: John Pironti, chief information risk strategist at Amsterdam-based IT-consulting firm Getronics NV; Mark Lobel, a security expert in PricewaterhouseCoopers's advisory practice; and Craig Schmugar, a threat researcher at security-software maker McAfee Inc.

Here, then, are the 10 secrets your IT department doesn't want you to know, the risks you'll face if you use them -- and tips about how to keep yourself (and your job) safe while you're at it.

* * *

1. HOW TO SEND GIANT FILES

The Problem: Everybody needs to email big files from time to time, everything from big marketing presentations to vacation photos. But if you send anything larger than a few megabytes, chances are you'll get an email saying you've hit the company's limit.

Companies cap the amount of data employees can send and store in email for a very simple reason: They want to avoid filling up their servers, and thus slowing them down, says messaging-research firm Osterman Research Inc., of Black Diamond, Wash. And getting your company to increase your email limit can be a convoluted process.

The Trick: Use online services such as YouSendIt Inc., SendThisFile Inc. and Carson Systems Ltd.'s DropSend, which let you send large files -- sometimes up to a few gigabytes in size -- free of charge. To use the services, you typically have to register, supplying personal information such as name and email address. You can then enter the recipient's email address and a message to him or her, and the site will give you instructions for uploading the file. In most cases, the site will send the recipient a link that he or she can click to download the file.

The Risk: Because these services send your files over the Web, they're outside of your company's control. That makes it easier for a wily hacker to intercept files during their travels.

How to Stay Safe: Some of the services are more reputable than others. YouSendIt, for instance, is a start-up run by a former Adobe Systems Inc. executive and funded by well-known venture-capital firms. Others offer little information on their sites about themselves and could be more susceptible to security holes that could let a hacker steal your information.

If the site's backers aren't immediately apparent, there are other clues that can help. Look for a "secure" icon -- in Internet Explorer, it's a little lock on the bottom of the screen -- which signifies that the site is using encryption to protect its visitors' confidential information. A logo from a security company such as VeriSign Inc., meanwhile, means VeriSign has confirmed the identity of the site's owner.

* * *

2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD

The Problem: Many companies require that employees get permission from the IT department to download software. But that can be problematic if you're trying to download software that your IT department has blacklisted.

The Trick: There are two easy ways around this: finding Web-based alternatives or bringing in the software on an outside device.

The first is easier. Say your company won't let you download the popular AOL Instant Messenger program, from Time Warner Inc.'s AOL unit. You can still instant-message with colleagues and friends using a Web-based version of the service called AIM Express (AIM.com/aimexpress.adp). There's also Google Inc.'s instant-messaging service, Google Talk, accessible at Google.com/talk. There are Web-based equivalents of software such as music players and videogames, too -- typically, skimpier versions with fewer features than the regular programs.

The other approach to this problem is more involved but gives you access to actual software programs on your computer. All three of our experts pointed to a company called Rare Ideas LLC (RareIdeas.com), which offers free versions of popular programs such as Firefox and OpenOffice. You can download the software onto a portable device like an iPod or a USB stick, through a service called Portable Apps (PortableApps.com). Then hook the device up to your work computer, and you're ready to go. (But if your company blocks you from using external devices, you're out of luck.)

The Risk: Using Web-based services can be a strain on your company's resources. And bringing in software on outside devices can present a security problem. IT departments like to keep track of all the software used by employees, so that if a bug or other security problem arises, they can easily put fixes in place. That's not the case if you've brought the program in on your own.

Another thing to keep in mind: Some less reputable software programs, especially underground file-sharing programs, could come loaded with spyware and make it possible for your own files to leak onto the Web.

How to Stay Safe: If you bring in software on an outside device, says Mr. Lobel, make sure you at least tweak the security settings on your computer's antivirus software so that it scans the device for potential threats. That's easy to do, usually through an Options or Settings menu. Likewise, if you use a file-sharing service, set it up so that others can't access your own files, also through an Options or Settings area.

* * *

3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS

The Problem: Companies often block employees from visiting certain sites -- ranging from the really nefarious (porn) to probably bad (gambling) to mostly innocuous (Web-based email services).

The Trick: Even if your company won't let you visit those sites by typing their Web addresses into your browser, you can still sometimes sneak your way onto them. You travel to a third-party site, called a proxy, and type the Web address you want into a search box. Then the proxy site travels to the site you want and displays it for you -- so you can see the site without actually visiting it. Proxy.org, for one, features a list of more than 4,000 proxies.

Another way to accomplish the same thing, from Mr. Frauenfelder and Ms. Trapani: Use Google's translation service, asking it to do an English-to-English translation. Just enter this -- Google.com/translate?langpair=en|en&u=www.blockedsite.com -- replacing "blockedsite.com" with the Web address of the site you want to visit. Google effectively acts as a proxy, calling up the site for you.

The Risk: If you use a proxy to, say, catch up on email or watch a YouTube video, the main risk is getting caught by your boss. But there are scarier security risks: Online bad guys sometimes buy Web addresses that are misspellings of popular sites, then use them to infect visitors' computers, warns Mr. Lobel. Companies often block those sites, too -- but you won't be protected from them if you use a proxy.

How to Stay Safe: Don't make a habit of using proxies for all your Web surfing. Use them only to visit specific sites that your company blocks for productivity-related reasons -- say, YouTube. And watch your spelling.

* * *

4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP

The Problem: If you use a company-owned laptop at home, chances are you use it for personal tasks: planning family vacations, shopping for beach books, organizing online photo albums and so on. Many companies reserve the right to monitor all that activity, because the laptops are technically their property. So what happens if your -- ahem -- friend accidentally surfs onto a porn site or does a Web search for some embarrassing ailment?

The Trick: The latest versions of the Internet Explorer and Firefox browsers both make it easy to clear your tracks. In IE7, click on Tools, then Delete Browsing History. From there, you can either delete all your history by clicking Delete All or choose one or a few kinds of data to delete. In Firefox, just hit Ctrl-Shift-Del -- or click Clear Private Data under the Tools menu.

The Risk: Even if you clear your tracks, you still face risks from roaming all over the Web. You could unintentionally install spyware on your computer from visiting a sketchy site or get your boss involved in legal problems for your behavior. If you're caught, it could mean (at best) embarrassment or (at worst) joblessness.

How to Stay Safe: Clear your private data as often as possible. Better yet, don't use your work computer to do anything you wouldn't want your boss to know about.

* * *

5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME

The Problem: You're catching up on work late at night or over the weekend -- but the documents you need to search through are stuck on your office PC.

The Trick: Google, Microsoft, Yahoo and IAC/InterActiveCorp's Ask unit have all released software that lets you quickly search your desktop documents. On top of that, some will let you search through documents saved on one computer from another one. How does it work? The search company keeps a copy of your documents on its own server. So it can scan those copies when you do a search remotely.

To use Google's software -- among the most popular -- follow these steps on both your work and home PC. First, you'll need to set up a Google account on both machines by visiting Google.com/accounts. (Be sure to use the same account on both computers.) Then go to Desktop.Google.com to download the search software. When it's up and running -- again, do this on both machines -- click on Desktop Preferences, then Google Account Features. From there, check the box next to Search Across Computers. After that point, any document you open on either machine will be copied to Google's servers -- and will be searchable from either machine.

The Risk: Corporate technology managers offer this nightmare scenario: You've saved top-secret financial information on your work PC. You set up desktop-search software so that you can access those files when working from home on your laptop. Then you lose your laptop. Uh-oh.

Getting hold of your company's internal documents could give others insight into your plans, and losing certain information could have legal repercussions. In particular, myriad state laws regulate how a company has to react when it loses private information about customers or employees; most require notifying those people about the breach in writing. Sending those notifications can be costly for your company -- not to mention damaging to its reputation.

On top of that threat, researchers have found vulnerabilities in Google's desktop-search software that could let a hacker trick a user into giving up access to files, says Mr. Schmugar of McAfee. (Those vulnerabilities have since been fixed, but more could crop up, he says.)

Matt Glotzbach, product management director for Google Enterprise, says there are bound to be vulnerabilities in any software and that, to the best of his knowledge, none of the Google Desktop vulnerabilities were exploited by hackers. He adds that when Google finds out about a vulnerability, it quickly fixes it and notifies users.

How to Stay Safe: If you have any files on your work PC that shouldn't be made public, ask your IT administrator to help you set up Google Desktop to avoid accidental leaks.

* * *

6. HOW TO STORE WORK FILES ONLINE

The Problem: Desktop search aside, most people who often work away from the office have come up with their own solution to getting access to work files. They save them on a disk or a portable device and then plug it into a home computer. Or they store the files on the company network, then access the network remotely. But portable devices can be cumbersome, and company-network connections can be slow and unreliable.

The Trick: Use an online-storage service from the likes of Box.net Inc., Streamload Inc. or AOL-owned Xdrive. (Box.net also offers its service inside the social-networking site Facebook.) Most offer some free storage, from one to five gigabytes, and charge a few dollars a month for premium packages with extra space. Another guerrilla storage solution is to email files to your private, Web-based email account, such as Gmail or Hotmail.

The Risk: A bad guy could steal your password for one of these sites and quickly grab copies of your company's sensitive files.

How to Stay Safe: When you're thinking about storing a file online, ask yourself if it would be OK for that file to be splashed all over the Internet or sent to the CEO of your company's top rival. If so, go for it. If not, don't.

* * *

7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL

The Problem: Many companies now have the ability to track employees' emails, both on work email accounts and personal Web-based accounts, as well as IM conversations.

The Trick: When you send emails -- using either your work or personal email address -- you can encrypt them, so that only you and the recipient can read them. In Microsoft Outlook, click on Tools, then Options and choose the Security tab. There, you can enter a password -- and nobody can open a note from you without supplying it. (Of course, you'll have to tell people the code beforehand.)

For Web-based personal email, try this trick from Mr. Frauenfelder: When checking email, add an "s" to the end of the "http" in front of your email provider's Web address -- for instance, https://www.Gmail.com. This throws you into a secure session, so that nobody can track your email. Not all Web services may support this, however.

To encrypt IM conversations, meanwhile, try the IM service Trillian from Cerulean Studios LLC, which lets you connect to AOL Instant Messenger, Yahoo Messenger and others -- and lets you encrypt your IM conversations so that they can't be read.

The Risk: The main reason companies monitor email is to catch employees who are leaking confidential information. By using these tricks, you may set off false alarms and make it harder for the IT crew to manage real threats.

How to Stay Safe: Use these tricks only occasionally, instead of as a default.

* * *

8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY

The Problem: Anyone without a BlackBerry knows the feeling: There's a lull in the conversation when you're out to dinner or an after-work beer, and everyone reaches for their pocket to grab their BlackBerry, leaving you alone to stir your drink.

The Trick: You, too, can stay up to date on work email, using any number of consumer-oriented hand-held devices. Just set up your work email so that all your emails get forwarded to your personal email account.

In Microsoft Outlook, you can do this by right-clicking on any email, choosing Create Rule, and asking that all your email be forwarded to another address. Then, set up your hand-held to receive your personal email, by following instructions from the service provider for your hand-held. (That's the company that sends you your bill.)

The Risk: Now, not only can hackers break into your personal account by going online on a computer, they can also break into it by exploiting security vulnerabilities on your mobile device.

How to Stay Safe: There's a kosher way to access work email on some devices, by getting passwords and other information from your IT department.

* * *

9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY

The Problem: If you do have a BlackBerry, you've probably got a different problem: You want to get your personal email just as easily as work email.

The Trick: Look at the Settings area of your personal email account, and make sure you've enabled POP -- Post Office Protocol -- a method used to retrieve email from elsewhere. Then log in to the Web site for your BlackBerry service provider. Click on the Profile button, look for the Email Accounts section and click on Other Email Accounts. Then click Add Account and enter the information for your Web-based email account. Now your personal emails will pop up on the same screen as your company email.

The Risk: Your company probably uses a whole bunch of security technology to keep viruses and spies out of your files. When you receive personal email on your BlackBerry, it's coming to you without passing through your company's firewall. That means viruses or spyware could sneak onto your BlackBerry via a personal email, says Mr. Schmugar of McAfee. Worse yet, he says, when you plug your BlackBerry into your work computer, there's a chance that the malicious software could jump onto your hard drive.

How to Stay Safe: Cross your fingers and hope that your personal email provider is doing a decent job weeding out viruses, spyware and other intruders. (Chances are, it is.)

* * *

10. HOW TO LOOK LIKE YOU'RE WORKING

The Problem: You're doing some vital Web surfing and your boss turns the corner. What do you do?

The Trick: Hit Alt-Tab to quickly minimize one window (say, the one where you're browsing ESPN.com) and maximize another (like that presentation that's due today).

The Risk: The good news is that there are no known security risks.

How to Stay Safe: Get back to work.

 

 
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
### 回答1: 我们大学面临的一个业务问题是,学生们缺乏有效的学习技能和学习方法。信息技术可以帮助解决这个问题,例如,可以使用数字化的学习工具来强化学习技能,例如在线课程和虚拟实践环境。此外,信息技术还可以改善教学模式,使学习者能够进行自主学习,以帮助他们更好地理解课程内容,提高学习效率。 ### 回答2: 我希望看到解决的商业问题是大学的信息交流和沟通不畅的问题。大学是一个庞大而复杂的机构,需要各个部门之间的高效合作和信息共享来实现顺畅的运作。然而,现实情况是,很多大学在信息传递和沟通方面存在着困难。 信息技术可以帮助解决这个问题。首先,大学可以建立一个统一的信息平台,例如使用内部网站或应用程序,以便学生、教师和员工可以轻松地获取相关信息。这个平台可以提供课程表、成绩、校历、社团活动等信息,使得所有人都能够快速、准确地了解大学的各种事务。 其次,大学可以利用信息技术建立在线沟通渠道,如电子邮件、即时通讯等工具,以促进学生、教师和员工之间的交流与合作。这将帮助大家更好地协调工作,提高教学和行政效率。 此外,信息技术还可以用于大学内部的项目和任务管理。通过使用项目管理软件或平台,大学可以更好地分配任务、跟踪进展并确保项目按时完成。这将有助于提高工作效率和组织管理能力。 另外,信息技术还可以用于大学的资源管理。借助信息技术,大学可以建立一个集中管理的系统,用于跟踪和管理校园内的各种资源,如设备、实验室和场地。这将帮助大学更好地利用资源,避免浪费和重复采购。 总之,信息技术可以为大学解决信息交流和沟通不畅的问题。通过建立统一的信息平台、在线沟通渠道、项目和任务管理系统以及资源管理系统,大学可以提高工作效率、促进协作和资源利用,从而更好地满足大学的发展需求。 ### 回答3: 我希望解决的一个大学业务问题是与学生选课相关的困扰。每个学期,学生都面临着选课过程中的许多挑战,如时间冲突、选修课的相互依赖性等。信息技术可以帮助解决这个问题的方案如下: 首先,我们可以开发一个在线选课系统,学生可以通过该系统查询所有可选课程的时间表和地点,以便更好地安排他们的课程表。此系统还可以提供实时信息更新,以告知学生当有课程变动时可以及时调整。 其次,我们可以利用人工智能技术来进行预测和优化学生选课。系统可以分析学生的选课历史、兴趣爱好和学业进展,为他们推荐最适合的课程。同时,系统还可以根据学生的个人时间表和偏好进行智能调整,避免时间冲突和疲劳过度。 此外,我们还可以开发一个学生反馈系统,让学生可以分享他们选修课程的体验和建议。这可以帮助学校更好地了解哪些课程受到学生青睐,哪些课程可能需要改进。随着时间的推移,学校可以根据学生的反馈不断地优化课程设置。 综上所述,信息技术可以在学生选课中起到重要作用。通过开发在线选课系统、利用人工智能技术进行个性化推荐和优化,以及建立学生反馈系统,我们可以为学生提供更加便利和高效的选课体验,进一步提升学校教学质量。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值