Blog

SHOCK: 66% of Fired Employees Able to Access Their Former Company’s Cloud Data

b2ap3_thumbnail_rogue_ex_employees_400.jpgEvery business executive knows the struggle of employee turnover. Your employees might come and go, but your data is one thing that you can’t afford to lose from your business. You might feel that you can trust all of the employees who have put in years of effort to ensure your organization stays afloat, but you may be surprised to learn that a significant number of them will probably leave your company with at least some corporate data.

As reported by SailPoint, at least a quarter of your employees will take copies of corporate data with them when they leave your organization. This survey dealt specifically with cloud computing usage, and was issued to around 3,000 employees worldwide. As explained by SailPoint president Kevin Cunningham, “The survey results are an eye-opener of how cloud applications have made it easy for employees to take information with them when they leave a company.”

If you think about it, this number isn’t so surprising. With the popularity of Bring Your Own Device (BYOD) policies increasing over time, employees are able to make off with copies of your business’s precious files, even unintentionally, much easier than before.

In fact, one out of every five employees has the intention of uploading corporate data to the cloud via Google Docs, Dropbox, or another service, and share this information with those outside the organization. It can feel disheartening that your trusted team would consider doing this, but it’s important to realize that not all employees will do so. The staff you really need to watch out for are the ones who storm out of your office in a fit of rage.

Here are some more statistics from the survey:

  • 66 percent of employees said they were able to access a business' cloud storage applications after they left their last job.
  • 60 percent said they were aware that their employer strictly forbids taking intellectual property when they leave the company.
  • Only 28 percent said their employer's corporate policies describe who can access mission-critical software-as-a-service (SaaS) apps.

How does your IT department plan on handling this issue? Employees potentially stealing sensitive data isn’t something that should be ignored. You need to enact policies that restrict access and user permissions in order to minimize the chance that a rogue employee will contribute to corporate sabotage. It’s vital that you take initiative to restrict your network from terminated employees as soon, or possibly even before, they find out they won’t be working for you anymore.

If you’re concerned about rogue employees leaving with your hard-earned data, or if you want to bolster your network security practices in general, give White Mountain IT Services a call at 603-889-0800.

Related Articles

  • Could You Spot a Social Engineering Attack? As invaluable as the security solutions that protect a network are, they can be effectively rendered useless if a cybercriminal is skilled in social engineering. Social engineering is the practice of using manipulation to access protected resources, as we will review later. If your business and its ...
  • Businesses Utilizing Cloud-Hosted HR and Payroll Cloud computing can be used for many things, and nowhere is this more true than in the business environment. Organizations of all shapes and sizes use the cloud to keep operations moving forward. Some have even moved their entire human resources and payroll departments into the cloud. We’ll help you...
  • Here’s How Companies Struggle with IT Security No business can be successful if it’s constantly suffering from data breaches. Therefore, you should take measures to mitigate the issues caused by these threats before they present themselves. Here are four of the biggest issues your business could face in the field of network security. Password...
  • Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
  • A Brief Overview of Network Security The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multipl...
  • FREE Printout: Dos and Don’ts of IT Security The following guide is designed to be used by business owners and office managers as an educational resource to establish some basic IT security best practices in the workplace. Feel free to print it out and hand it out or post it in common areas. You work on important things. Let’s all work togeth...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

603-889-0800

White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064

 

 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions