Data Threat: Your Ex-Employees

Despite increasing cyber-security awareness at companies of all sizes, many businesses are not doing enough to guard against security threats brought on by ex-employees, according to a new study from identity management provider OneLogin.

The company surveyed 500 US-based IT decision makers, and 20 percent of the respondents said failure to de-provision employees from corporate applications has contributed to a data breach at their organisation.

The research found that nearly half (48 percent) of respondents are aware of former employees who still have access to corporate applications, with 50 percent saying ex-employee’s accounts remain active once they have left the company for longer than a day.

One quarter (25 percent) of respondents take more than a week to deprovision a former employee and the same percentage said they don’t know how long accounts remain active once the employee has left the company.

The study finds close to half (44 percent) of respondents, lack confidence that former employees have been removed from corporate networks at all.

“The bottom-line is that companies aren’t following very basic but essential security measures around employee provisioning and deprovisioning,” said Alvaro Hoyos, chief information security officer at OneLogin. “This should be a cause for concern among business leaders, especially considering how many data breaches are caused by ex-employees.”

Information-Management:

You Might Also Read:

Employees That Cause Data Breaches:

Safeguard Data When Employees Leave:

 

« IoT Is Becoming A Nightmare For IT
British Innovation Lags Behind France & Germany’s »

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to design a least privilege architecture in AWS

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 - Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Go Cyber

Go Cyber

Go Cyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SSLGuru

SSLGuru

SSLGURU provide tools and services to manage SSL certificates and to create higher level of online security.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.