In-depth

Let's play IT security Buzzword Bingo

A report into the threats employees pose to data security has Davey Winder up in arms this week...

Exit doors

Many years ago I'd amuse myself by playing a game called Buzzword Bingo. Each week someone in my IT security professional network of friends would distribute a bingo card laid out with the most outrageous ITSec lingo of the time.

If a press release, research document or even telephone conversation with a client included any of those words, I'd cross them off. Prizes, generally beer-shaped ones, were awarded for four corners or a line.

If I were still playing today, I would be well on my way to a full house this week, having overheard phrases such as offboarding, deprovisioning, rogue access, exit interviews and user lifecycle management. Can you tell what I've been researching yet?

No, I'm not surprised. So let me help you by revealing all. The reason for this myriad of management speak is a report which looked at the threat to enterprise data from former employees.

The problem is one that could hit smaller businesses hardest, as they are less likely to have the same kind of rigorous controls in place when it comes to changing application logins.

According to the survey by Osterman Research (commissioned by hosting firm Intermedia), 89 per cent of employees retained access to applications such as PayPal and Salesforce after leaving an organisation, which was described by the Intermedia spokesperson who contacted me as "posing a big threat".

Well, you don't say? Furthermore, over half of those ex-employees actually logged in after leaving the firm.

Am I allowed to say WTF at this point? Seriously, it's enough to make me think there's almost no point being an IT security consultant any longer if enterprises are making this kind of rookie error. Of course, I say almost as I am kept in business courtesy of this ridiculous lack of secure thinking. What's really amazing is these organisations are going out of business for the same reason.

Offboarding may be a silly word, and one that sounds like it has something to do with spooks interviewing suspected terrorists, but it describes a very serious weapon in the enterprise security armoury: access revocation.

When the organisations questioned admitted the number of ex-employees retaining access to confidential information was 45 per cent, you get an idea of just how important an exit interview can be.

Yep, the admin guys should be revoking access rights as a matter of course, that goes without saying, but it does seem that a reminder to departing employees about the legality of popping back in for a nosey, or to store data, as 68 per cent were doing, might be in order as well.

The problem is one that could hit smaller businesses hardest, as they are less likely to have the same kind of rigorous controls in place when it comes to changing application logins.

Some 60 per cent of respondents said they were not asked for cloud logins when they left their companies. It's not like these people even have to be malicious to do damage, just storing something inappropriate on company servers could be enough.

C'mon people, get with the offboarding exit interview user lifecycle program. House!

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Leading the data race

The trends driving the future of data science

Download now

How to create 1:1 customer experiences at scale

Meet the technology capable of delivering the personalisation your customers crave

Download now

How to achieve daily SAP releases

Accelerate the pace of SAP change to support your digital strategy

Download now

Recommended

Hundreds of thousands of Instacart customers impacted by data breach
phishing

Hundreds of thousands of Instacart customers impacted by data breach

23 Jul 2020
How to enhance your backup strategy
backup

How to enhance your backup strategy

27 Feb 2020
Are you taking enough accountability on cyber security?
Security

Are you taking enough accountability on cyber security?

18 Dec 2019
How can you protect your business from crypto-ransomware?
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019

Most Popular

Unilever adopts Google Cloud’s complex data processing for conservation drive
big data analytics

Unilever adopts Google Cloud’s complex data processing for conservation drive

22 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020