Welcome!

News Feed Item

The ex-employee menace: 89% retain access to Salesforce, QuickBooks & other sensitive corporate apps

Intermedia's 2014 SMB Rogue Access Study explores the security threat posed by former employees.

MOUNTAIN VIEW, Calif., Aug. 12, 2014 /PRNewswire/ -- Every month, hundreds of thousands of Americans leave their jobs. And they're bringing their IT access with them—from passwords to the corporate Twitter account to confidential files stored in personal Dropbox accounts.

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/7281751-intermedia-s-2014-smb-rogue-access-study-security-threat-posted-by-former-employees/

This data comes from the 2014 Intermedia SMB Rogue Access Study, which was released today. Based on a survey of knowledge workers performed by Osterman Research, this study quantifies the staggering scope of the "Rogue Access" problem. And it presents a wake-up call for every business in the country.

Read the Rogue Access report at  http://ow.ly/A4JtO. Some of the more shocking findings include:

  • 89% of those surveyed retained access to Salesforce, PayPal, email, SharePoint or other sensitive corporate apps
  • 45% retained access to "confidential" or "highly confidential" data
  • 49% actually logged into ex-employer accounts after leaving the company
  • 68% admitted to storing work files in personal cloud storage services

"Most small businesses think 'IT security' applies only to big businesses battling foreign hackers," says Michael Gold, President of Intermedia. "This report should shock smaller businesses into realizing that they need to protect their leads databases, financial information and social reputation from human error as well as from malicious activity."

These risks have both technical and procedural causes. In fact, one of the weakest points identified in the report is the lack of formal "IT offboarding" procedures: 60% of respondents said they were NOT asked for their cloud logins when they left their companies.

From lost data to compliance failures: the wide-ranging risks of Rogue Access

The risks of Rogue Access are endless. Disgruntled ex-employees could steal money from PayPal, falsify financial details in Quickbooks, or post inappropriately on company social media. Well-intentioned ex-employees might purge important files from their personal cloud storage. And there are legal risks as well, such as the inability to complete eDiscovery or the failure to comply with regulatory obligations to protect sensitive data.

"I've heard a lot of stories about sales people who export customer lists or users who wipe all their data," says Felix Yanko, president of Pittsburgh-based ServNet Tech, an IT consultant and Intermedia partner. "For a small business particularly, 'Rogue Access' creates a huge risk: if something happens that affects their clients and they get sued, they usually go out of business."

Three solutions to the Rogue Access challenge

To help businesses regain control over access to their IT apps, Intermedia's report presents three solutions:

  • First, companies should implement strict access and user lifecycle management policies, including a stringent IT offboarding checklist. Intermedia has developed a collection of best practices as well as an IT offboarding checklist, and made them free to download.
  • Second, companies should offer business-grade cloud storage that's as easy to use as consumer-grade services. This makes it less likely that employees will use personal services that lack high levels of IT control and protection.
  • Finally, companies should provide users with single sign-on portals. SSO portals are a fast-trending IT tool for a reason: they give users a single point of entry into the cloud, which makes it much easier for IT to manage and track access.

"People want to work at home. They want files available when they're traveling. But when a company puts this functionality into place in an organic, uncoordinated way, there are real risks they may not have considered," says Michael Osterman, President of Osterman Research. "This report provides direction for these companies to regain control over their cloud."

For more information—including a downloadable list of IT access best practices and an IT offboarding checklist—read Intermedia's Rogue Access report at http://ow.ly/A4JtO. You can also follow @intermedia_net on Twitter or participate in the conversation at #StopRogueAccess.

About Intermedia

Intermedia is the world's largest one-stop shop for cloud business applications. Its Office in the Cloud™ suite integrates all of the essential IT services that SMBs need to do business, including email, voice, file sync and share, single sign-on, security, mobility, archiving and more.

Intermedia's services thwart the ex-employee menace by making it simple to revoke access to the entire cloud footprint with just one click. All of its services are integrated, secure, mobile-ready and managed from a single control panel. And they all offer enterprise-grade security, 99.999% availability and 24/7 phone support with hold times of less than 60 seconds.

Intermedia's 600 employees work relentlessly to provide its 60,000 customers, 1 million users and 5,000 active partners with a Worry-free Experience™. Learn more at Intermedia.net.

Contact
Kristen Berry, (650) 691-7318, [email protected]

Rogue Access -- the Ex-Employee Menace

 

Intermedia’s Rogue Access report highlights the ex-employee menace.

 

How to stop Rogue Access

 

Rogue Access — your confidential files are at risk.

 

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/7281751-intermedia-s-2014-smb-rogue-access-study-security-threat-posted-by-former-employees/

SOURCE Intermedia

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
"We provide DevOps solutions. We also partner with some key players in the DevOps space and we use the technology that we partner with to engineer custom solutions for different organizations," stated Himanshu Chhetri, CTO of Addteq, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, discussed the best practices that will ensure a successful smart city journey.
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors an...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.