Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Pat Romanski, William Schmarzo, Elizabeth White, Carmen Gonzalez

News Feed Item

The ex-employee menace: 89% retain access to Salesforce, QuickBooks & other sensitive corporate apps

Intermedia's 2014 SMB Rogue Access Study explores the security threat posed by former employees.

MOUNTAIN VIEW, Calif., Aug. 12, 2014 /PRNewswire/ -- Every month, hundreds of thousands of Americans leave their jobs. And they're bringing their IT access with them—from passwords to the corporate Twitter account to confidential files stored in personal Dropbox accounts.

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/7281751-intermedia-s-2014-smb-rogue-access-study-security-threat-posted-by-former-employees/

This data comes from the 2014 Intermedia SMB Rogue Access Study, which was released today. Based on a survey of knowledge workers performed by Osterman Research, this study quantifies the staggering scope of the "Rogue Access" problem. And it presents a wake-up call for every business in the country.

Read the Rogue Access report at  http://ow.ly/A4JtO. Some of the more shocking findings include:

  • 89% of those surveyed retained access to Salesforce, PayPal, email, SharePoint or other sensitive corporate apps
  • 45% retained access to "confidential" or "highly confidential" data
  • 49% actually logged into ex-employer accounts after leaving the company
  • 68% admitted to storing work files in personal cloud storage services

"Most small businesses think 'IT security' applies only to big businesses battling foreign hackers," says Michael Gold, President of Intermedia. "This report should shock smaller businesses into realizing that they need to protect their leads databases, financial information and social reputation from human error as well as from malicious activity."

These risks have both technical and procedural causes. In fact, one of the weakest points identified in the report is the lack of formal "IT offboarding" procedures: 60% of respondents said they were NOT asked for their cloud logins when they left their companies.

From lost data to compliance failures: the wide-ranging risks of Rogue Access

The risks of Rogue Access are endless. Disgruntled ex-employees could steal money from PayPal, falsify financial details in Quickbooks, or post inappropriately on company social media. Well-intentioned ex-employees might purge important files from their personal cloud storage. And there are legal risks as well, such as the inability to complete eDiscovery or the failure to comply with regulatory obligations to protect sensitive data.

"I've heard a lot of stories about sales people who export customer lists or users who wipe all their data," says Felix Yanko, president of Pittsburgh-based ServNet Tech, an IT consultant and Intermedia partner. "For a small business particularly, 'Rogue Access' creates a huge risk: if something happens that affects their clients and they get sued, they usually go out of business."

Three solutions to the Rogue Access challenge

To help businesses regain control over access to their IT apps, Intermedia's report presents three solutions:

  • First, companies should implement strict access and user lifecycle management policies, including a stringent IT offboarding checklist. Intermedia has developed a collection of best practices as well as an IT offboarding checklist, and made them free to download.
  • Second, companies should offer business-grade cloud storage that's as easy to use as consumer-grade services. This makes it less likely that employees will use personal services that lack high levels of IT control and protection.
  • Finally, companies should provide users with single sign-on portals. SSO portals are a fast-trending IT tool for a reason: they give users a single point of entry into the cloud, which makes it much easier for IT to manage and track access.

"People want to work at home. They want files available when they're traveling. But when a company puts this functionality into place in an organic, uncoordinated way, there are real risks they may not have considered," says Michael Osterman, President of Osterman Research. "This report provides direction for these companies to regain control over their cloud."

For more information—including a downloadable list of IT access best practices and an IT offboarding checklist—read Intermedia's Rogue Access report at http://ow.ly/A4JtO. You can also follow @intermedia_net on Twitter or participate in the conversation at #StopRogueAccess.

About Intermedia

Intermedia is the world's largest one-stop shop for cloud business applications. Its Office in the Cloud™ suite integrates all of the essential IT services that SMBs need to do business, including email, voice, file sync and share, single sign-on, security, mobility, archiving and more.

Intermedia's services thwart the ex-employee menace by making it simple to revoke access to the entire cloud footprint with just one click. All of its services are integrated, secure, mobile-ready and managed from a single control panel. And they all offer enterprise-grade security, 99.999% availability and 24/7 phone support with hold times of less than 60 seconds.

Intermedia's 600 employees work relentlessly to provide its 60,000 customers, 1 million users and 5,000 active partners with a Worry-free Experience™. Learn more at Intermedia.net.

Contact
Kristen Berry, (650) 691-7318, [email protected]

Rogue Access -- the Ex-Employee Menace

 

Intermedia’s Rogue Access report highlights the ex-employee menace.

 

How to stop Rogue Access

 

Rogue Access — your confidential files are at risk.

 

To view the multimedia assets associated with this release, please click http://www.multivu.com/players/English/7281751-intermedia-s-2014-smb-rogue-access-study-security-threat-posted-by-former-employees/

SOURCE Intermedia

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems. In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
The consumption economy is here and so are cloud applications and solutions that offer more than subscription and flat fee models and at the same time are available on a pure consumption model, which not only reduces IT spend but also lowers infrastructure costs, and offers ease of use and availability. In their session at 15th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed this shifting dynamic with an ...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackI...
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud? What does the discovery, assessment and planning look like? What workloads make sense? Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT transformation?
You use an agile process; your goal is to make your organization more agile. But what about your data infrastructure? The truth is, today's databases are anything but agile - they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver new features and capabilities needed to make your organization competitive. As your application an...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises a...
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
SYS-CON Events announced today that SUSE, a pioneer in open source software, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SUSE provides reliable, interoperable Linux, cloud infrastructure and storage solutions that give enterprises greater control and flexibility. More than 20 years of engineering excellence, exceptional service and an unrivaled partner ecosystem power the products and support that help ...
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
There's no doubt that the Internet of Things is driving the next wave of innovation. Google has spent billions over the past few months vacuuming up companies that specialize in smart appliances and machine learning. Already, Philips light bulbs, Audi automobiles, and Samsung washers and dryers can communicate with and be controlled from mobile devices. To take advantage of the opportunities the Internet of Things brings to your business, you'll want to start preparing now.
In a world of ever-accelerating business cycles and fast-changing client expectations, the cloud increasingly serves as a growth engine and a path to new business models. Dynamic clouds enable businesses to continuously reinvent themselves, adapting their business processes, their service and software delivery and their operations to achieve speed-to-market and quick response to customer feedback. As the cloud evolves, the industry has multiple competing cloud technologies, offering on-premises ...
As the world moves from DevOps to NoOps, application deployment to the cloud ought to become a lot simpler. However, applications have been architected with a much tighter coupling than it needs to be which makes deployment in different environments and migration between them harder. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, Netflix and so on is at the heart of CloudFoundry – a complete developer-oriented Platform as a Service (PaaS...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...