Posted by: Michael Morisy
2010, Google Guerillas, Hacking Work, Power users
It’s a bird, it’s a plane … it’s the power user, already at a cubicle near you and posing all manners of threats and opportunities. By day, she’s a mild-mannered employee at a large metropolitan company. But she’s capable of skirting around IT rules and restrictions to do things the way she wants, often cutting out busy work but opening up new vulnerabilities.
The old example? Forgoing the sluggish fileshare in favor of thumbdrives that cut the process of sharing files across the office down to minutes, or let her take her work home at night. But what if that thumbdrive contained 7,000 social security numbers, and was lost?
The new example: The employees who routes all their corporate communications through their GMail account, their iPhone, and their Twitter.
And “hacking work” is now pitched not as the sole province of the uber-geeky but as a necessity to staying ahead in a tough tech-based economy. Steve Rubel issues a call-to-DIY IT arms, which ends with the somewhat inspiring, somewhat frightening appeal (emphasis mine):
Those who embrace using new technologies and tools will not only survive, but thrive. No one will teach you necessarily how to do this on your own. Each information worker needs to take matters into their own hands.