{"id":5155,"date":"2024-12-05T11:04:12","date_gmt":"2024-12-05T11:04:12","guid":{"rendered":"https:\/\/sysdojo.com\/?p=5155"},"modified":"2024-12-05T11:17:18","modified_gmt":"2024-12-05T11:17:18","slug":"security-alert-does-your-business-it-have-old-logins-for-ex-staff","status":"publish","type":"post","link":"https:\/\/sysdojo.com\/corp\/security-alert-does-your-business-it-have-old-logins-for-ex-staff\/","title":{"rendered":"Security alert: Does your business IT have old logins for ex-staff?"},"content":{"rendered":"\n<p>When someone leaves your business, you might be so wrapped up in the rush of everyday tasks, you forget to delete their login details. It\u2019s easy to overlook. Your business IT department will get around to it later, right?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-BlogarticleLinkedInnewsletterimage-1024x576.jpg\" alt=\"\" class=\"wp-image-5156\" srcset=\"https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-BlogarticleLinkedInnewsletterimage-1024x576.jpg 1024w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-BlogarticleLinkedInnewsletterimage-300x169.jpg 300w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-BlogarticleLinkedInnewsletterimage-768x432.jpg 768w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-BlogarticleLinkedInnewsletterimage-1536x864.jpg 1536w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-BlogarticleLinkedInnewsletterimage.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>But unused login details could be a ticking time bomb for <a href=\"https:\/\/sysdojo.com\/corp\/new-phishing-scam-is-smarter-than-ever-heres-how-to-protect-your-business\/\" data-type=\"link\" data-id=\"https:\/\/sysdojo.com\/corp\/new-phishing-scam-is-smarter-than-ever-heres-how-to-protect-your-business\/\">security breaches<\/a>, leaving the doors wide open to cyber criminals. It can also be an unnecessary drain on your budget if you\u2019re paying for old subscriptions your business IT team no longer needs.<\/p>\n\n\n\n<p>A recent report found that almost half of businesses had accounts that were no longer actively managed. If you\u2019ve forgotten about an account, you\u2019re not monitoring it. And this leaves your business vulnerable to attacks.<\/p>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" controls src=\"https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/12\/USwc2024-12-09-Techupdatevideoreadytouse.mp4\"><\/video><\/figure>\n\n\n\n<p>These risks aren\u2019t just hypothetical, either. Many cloud security breaches happen because <a href=\"https:\/\/www.securityweek.com\/ex-employees-admin-credentials-used-in-us-gov-agency-hack\/\" data-type=\"link\" data-id=\"https:\/\/www.securityweek.com\/ex-employees-admin-credentials-used-in-us-gov-agency-hack\/\" target=\"_blank\" rel=\"noopener\">unused login details and accounts have been compromised<\/a>.<\/p>\n\n\n\n<p>So, what do you need to do?<\/p>\n\n\n\n<p>Take the time to audit all accounts and login details used by your business. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).<\/p>\n\n\n\n<p>The same goes for any software or service that you\u2019ve stopped using in your business. You might not realize you\u2019re still paying for a service you haven\u2019t touched in months \u2013 or even years.<\/p>\n\n\n\n<p>Going forward, make sure you have a clear process for when people leave, and regularly review the applications and services your business uses.<\/p>\n\n\n\n<p>When managing business IT, it\u2019s essential to recognize the critical role account management plays in maintaining security and operational efficiency.<\/p>\n\n\n\n<p>Forgotten or inactive accounts create gaps in your cybersecurity framework, which cybercriminals are eager to exploit. These criminals often target overlooked login credentials as an easy entry point, potentially compromising sensitive data and undermining trust in your organization.<\/p>\n\n\n\n<p>Proactively managing these accounts isn\u2019t just about avoiding security breaches\u2014it\u2019s also about ensuring your business IT is streamlined and cost-effective.<\/p>\n\n\n\n<p>In addition to the immediate security threats, unused accounts can inflate costs. Many subscription-based services automatically renew, and if your business IT team isn\u2019t tracking these dormant accounts, you could be spending significant sums on software or platforms that offer no value to your operations.<\/p>\n\n\n\n<p>This waste of resources can add up over time, impacting your bottom line and diverting funds that could be better spent elsewhere, such as upgrading hardware, investing in training, or enhancing core IT infrastructure.<\/p>\n\n\n\n<p>To address these challenges, consider implementing an automated account deprovisioning system as part of your business IT processes.<\/p>\n\n\n\n<p>This ensures that when an employee leaves, their access to all systems is revoked promptly and comprehensively. <a href=\"https:\/\/sysdojo.com\/corp\/cyber-security-training-once-a-year-is-not-working\/\" data-type=\"link\" data-id=\"https:\/\/sysdojo.com\/corp\/cyber-security-training-once-a-year-is-not-working\/\">Regularly scheduled audits<\/a> of all software licenses and user accounts can further strengthen your IT management.<\/p>\n\n\n\n<p>By taking these steps, your organization can protect itself from cyber risks, optimize expenses, and maintain a well-oiled IT environment that supports growth and innovation. If you\u2019re not sure where to start, let us help you perform a security review and make sure you\u2019re not leaving your business exposed to unnecessary threats. Get in touch.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u2019s the first thing your business IT team do when someone leaves your business? If it\u2019s not deleting their account logins, it might be time to rethink your process.<\/p>\n","protected":false},"author":3,"featured_media":5156,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[92,45],"class_list":["post-5155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-businessit","tag-cybersecurity-2"],"_links":{"self":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts\/5155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/comments?post=5155"}],"version-history":[{"count":1,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts\/5155\/revisions"}],"predecessor-version":[{"id":5158,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts\/5155\/revisions\/5158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/media\/5156"}],"wp:attachment":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/media?parent=5155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/categories?post=5155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/tags?post=5155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}