runevirage
New Member
- Joined
- Mar 30, 2010
- Messages
- 80 (0.02/day)
If your IT department has access to network info like that needed to log on to a WPA2-Enterprise network, could they possibly log onto the network and act as you? If they have the logon info can they track things like your passwords while you are using the network, or access any program or files therein? I trust most IT departments are full of responsible individuals but I was wondering if this capability is even possible in the first place.
Last edited: