You are an IT manager in an organization. During a routine check of the log files on network usage, you find that one of the users Donald is using the network to access files from the server every day for 2 to 3 hours after regular working hours. You meet Donald in the cafeteria the next day and tell him not to work after regular hours. Donald is surprised and says that he very rarely works long hours. It's clear to you that someone has hacked on to the network and used Donald's credentials to access the servers. You find the culprit on further investigation. How will you react to the situation based on your responsibilities as an IT manager? In this situation which policy should the organization follow?
As IT manager it is your responsibility to report your findings to your supervisor so that the proper person can take action. This would entail alerting the hacker's supervisor and terminating employment of the hacker.
In addition, however, there is clearly ...
THis solution discusses a company issue in which an employee has hacked into the company database using a fellow employee's password. It outlines how to handle the situation as the IT manager of the company, and suggests policies for the organization to follow to prevent this from occurring in the future. It includes links.