Security alert: Does your business have old logins for ex-staff?

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks, you forget to delete their login details.

It’s easy to overlook. You’ll get around to it later, right?

But unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. It can also be an unnecessary drain on your budget if you’re paying for old subscriptions you no longer need.

A recent report found that almost half of businesses had accounts that were no longer actively managed.

If you’ve forgotten about an account, you’re not monitoring it. And this leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details used by your business. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).

The same goes for any software or service that you’ve stopped using in your business. You might not realise you’re still paying for a service you haven’t touched in months – or even years.

Going forward, make sure you have a clear process for when people leave, and regularly review the applications and services your business uses.

If you’re not sure where to start, let us help you perform a security review and make sure you’re not leaving your business exposed to unnecessary threats. Get in touch.

Past Blogs

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

You’ve probably heard a lot of talk about cyber attacks but how worried should you really be? Well, very, because cyber criminals are getting smarter. We have good news...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business. Why? Because cyber criminals are getting smarter than ever before. If they manage to crack just...
Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for...
Businesses are taking too long to fix vulnerabilities

Businesses are taking too long to fix vulnerabilities

If you knew your systems were at risk of attack, you’d jump in and get things locked down fast – right? Actually… many businesses take too long to fix vulnerabilities....
What Are CyberSecurity Services

What are Cybersecurity Services?

What are CyberSecurity Services ? In our digital world, the question of what cybersecurity services are is more relevant than ever. As businesses across the UK rely...
Employees are falling for 3x more phishing scams

Employees are falling for 3x more phishing scams

Cyber criminals are getting smarter, and businesses are paying the price – especially when it comes to phishing attacks. Here’s what to watch out for…

Warning: Don’t ignore hardware requirements for Windows 11

Warning: Don’t ignore hardware requirements for Windows 11

You might be ready for the upgrade to Windows 11, but is your hardware? Running the upgrade without meeting the minimum requirements could slow down everything in your...
benefits of cybersecurity

Benefits of CyberSecurity

The benefits of cybersecurity. With vast amounts of information are stored online, the benefits of robust cybersecurity are more vital than ever. At Network &...
what is dmarc

What is DMARC

What is DMARC and Why Does Your Business Need It? When it comes to protecting your business from cyber threats, email security is often overlooked. Yet, email is one of...
Why is password management software important

Why is Password Management Software Important

Why is Password Management Software Important for Your Business? In today’s digital world, passwords are the keys to your business’s most sensitive information. From...