m the CEO summoned everyone to
e hall, a wave of silence washed over the ro
s respected, looked at me
thew took
major security breach," he began,
owed a complex data trail, a series of logs and IP add
continued, his eyes sweeping the room before landing on me. "The data was
gasp went thr
ade using her encrypted credentials from a
reenshots of the system logs. They were good fake
hose logs are fabricated. I demand a full, deep forensic audit by an
ession grim. "Jennifer, we wil
d, her face a mask of sorr
weeks, Jen has been acting strange. Secretive phone calls, working late on files that wer
eceptive conspirator. The crowd murmured,
pended, effective immediately, pending the results of our intern
ecognized from the lobby
on his face. Molly stood beside him, her head restin
n. Publicly
my colleagues following me like a plague. I was no