Let’s take a moment to think about the kind of data and systems your employees can access. Your patient data, your practice information, your financial records, your strategy documents, your website system, your social reputation, and other confidential files of all types.
Now imagine the risk if your ex-employees had access to the exact same systems.
According to a new survey by Osterman Research, an incredible 89% of knowledge workers retained access to Dropbox, Salesforce, email, SharePoint and other sensitive corporate apps from a former employer.
Even worse, 45% can access what they consider “confidential” or “highly confidential” data.
This problem of “Rogue Access” creates countless risks for your practice: stolen secrets, lost data, compliance failures, data breaches, and out-and-out sabotage—to name a few.
Intermedia published The Ex-Employee Menace: 2014 SMB Rogue Access Study. If your IT access management and employee off-boarding policies are anything less than 100% watertight, you need to read it right now.
In addition to outlining the scope of the problem (which is far bigger than any of us imagined), it also provides three very important technical and procedural solutions—including access management best practices and an IT off-boarding checklist.
Read the Rogue Access White Paper now.
Review the access to your systems now/ Look for the gaps in your systems and procedures then update your checklists accordingly.
Let me know your thoughts