Businesses exposing confidential data to ex-employees

One third of IT decision makers say ex-employees are able to access systems after leaving

Data breach

Just under one third (32 per cent) of UK companies have admitted that people who've left their employ still have access to confidential files and systems, meaning their business could be wide open to a major security breach.

However, the number is much higher in the US, where over half of all companies said outgoing employees were probably able to log into systems after leaving the organisation.

Almost half of respondents to the research carried out by Centrifyy said they had the processes in place to 'offboard' leavers, the same number again have access rights and password knowledge that would allow them to break into systems up to a week after they cease working at the company.

The news is surprising considering more than half of the 400 UK and US IT decision makers questioned have suffered a security breach, yet still aren't taking action to prevent ex-employees attacking the organisation.

However, Centrify said the biggest mistake companies are making is giving employees access to such sensitive data and systems in the first place.

"Giving employees elevated access to privileged accounts and the organisation's most critical data, applications systems and network devices is essentially giving them the keys to the kingdom'. It's the equivalent of providing the front door key to your house and you'd be very, very careful who you gave that to." Barry Scott, CTO of EMEA at Centrify said.

"The challenge is that modern enterprises have their infrastructure both on-premises and in the cloud, they have a mobile workforce and IT users may be their own employees, temporary contractors or from external companies. Privileged accounts are a very attractive target for hackers."

He explained it's surprising that senior IT decision makers think their organisations should do better when it comes to monitoring who has access to what data, especially when it's considered that there have been a number of high profile cases that have exposed the risks.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021