How much is the security risk each time an employee leaves a company? Unfortunately, many enterprises don’t manage the risk very well. Often, processes for cancelling passwords or retrieving physical assets may be slipshod, or even non-existent.

Research by IS Decisions highlights the problem: Over a third (36 percent) of desk-based workers in the United States and the United Kingdom are aware of having access to a former employer’s systems or data after leaving an organisation. The number is even higher for younger workers – more than half (58 percent) of workers between 16 and 24 years of age say they still can access a former employer’s systems or data, and almost half (48 percent) of 25- to 34-year-olds say they can. The higher numbers in lower age groups may reflect that these groups change jobs more frequently. Still, even among workers over age 55, 21 percent say they can still access a former employer’s systems. Even worse, more than 1 ex-employee in 10 actually chooses to use the access to a former employer’s data, according to the research.

“Former employees are probably the greatest insider threat,” says François Amigorena, CEO of IS Decisions, a security software company that helps organisations like Barclays Bank, IBM and the U.S. Department of Justice secure their employees’ network access and user sessions.

You see the same pattern in the physical security world, too. How often do employees or managers leave a company and fail to return an access control card or the key to the front door? How vigilantly do administrators of access management systems delete permissions and credentials when an employee leaves? The familiarity of a former employee might easily encourage unwise relaxing of physical access control policies among friends who still work at a site.

Whether it’s logical or physical access, vigilance may be lacking. Important processes to ensure security may not be in place, or may not be observed. Clearly the best time to address the situation is before a security breach happens.

Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What's new in technology serving the transportation market?
What's new in technology serving the transportation market?

Transportation enables the movement of goods and people, facilitates trade and commerce, and is crucial for businesses to operate and expand. Security technology plays a major role...

What is the expanding role of audio in today's physical security systems?
What is the expanding role of audio in today's physical security systems?

Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Quick poll
Which feature is most important in a video surveillance system?