Manage Learn to apply best practices and optimize your operations.

When Microsoft shuts you down and other IT horror stories

An IT system gone bad can be more frightening than Freddy Krueger with a chainsaw. But if you've got the nerve, check out these top five IT horror stories.

Vampires? Ghosts? Monsters? These creatures of the night may haunt your nightmares -- but what about what's lurking in your IT department? Nothing is scarier than losing control of some critical aspect of IT -- well, except for possibly an auditor … or your boss.

Imagine being locked out of your system by someone on your own IT staff? Or losing a half-day's work after client access licenses suddenly and mysteriously became corrupted? What about struggling through the compliance maze and getting audited -- twice?

We have compiled a list of the top five most chilling midmarket tales (and the subsequent words of caution) from those who lived to tell about them.

 San Francisco network lockup justifies CIO fears
[Zach Church, News Writer]
It's almost too terrible to fathom -- a network administrator hijacks your network. But is there anything you can really do about it, other than keep your fingers crossed?

 MS software licensing, IT auditing tricky business
[Kristen Caretta, Associate Editor]
For one CTO, Microsoft client access licenses were inadvertently corrupted overnight (apparently by Microsoft), halting company productions for five hours. Could it happen to you?

 PDAs increase revenues, regulatory compliance risks
[Jeffrey Ritter, Contributor]
Personal digital assistants (PDAs), the most ubiquitous unified communications weapon, sometimes trade messaging flexibility for regulatory compliance rules.

 Software audit painful and costly for the noncompliant
[Zach Church, News]
Dynamic Systems Inc. CIO Will McManus learned about software license audits the hard way. He was audited -- twice.

 Unified communications: Securing access to OCS
[Brien M. Posey, Contributor]
Want to keep your unified communications as secure as possible? Start at the most vulnerable spot: the Office Communications Server edge server.

Let us know what you think about the story; email us.

Dig Deeper on Small-business IT strategy

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.