• Land_Strider@lemmy.world
      link
      fedilink
      English
      arrow-up
      87
      arrow-down
      1
      ·
      7 months ago

      Which was also used repeatedly over the course of 3-4 months to gain access via a non-corporate laptop without the IT doing anything about it.

      • Zer0_F0x@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        7 months ago

        I’ve been in IT for a few years and I’ve changed companies a few times. I just checked my login creds for various systems of 3 previous employers and like half of them still work. Unfortunately it’s a lot more common than any IT department would like to admit

    • kibiz0r@midwest.social
      link
      fedilink
      English
      arrow-up
      61
      arrow-down
      2
      ·
      7 months ago

      It’s only hacking if it’s in a CVE.

      Anything else is just sparkling unauthorized access.

    • yeehaw@lemmy.ca
      link
      fedilink
      English
      arrow-up
      21
      arrow-down
      9
      ·
      edit-2
      7 months ago

      Technically he was not authorized to use the computer system due to his termination which the law looks at and calls hacking.

        • yeehaw@lemmy.ca
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          12
          ·
          7 months ago

          I said the law looks at whether it was authorized access or not, I was not citing any literal lines from the law. Didn’t read the article because I know this already because of the industry I work in and I took a course a number of years ago that literally was about this.