When the Boss Leaves, What Data Is at Risk?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next When the Boss Leaves, What Data Is at Risk?-6 Next

Security Passwords to Exclusive Platforms

Restricting network access is a must when any employee departs, but IT teams must also ensure that the same happens for any third-party software and tools. It is essential that these are set up to allow the company to quickly and easily restrict access at the user-level, even if the data does not reside in-house.

Over the last few years, companies around the globe, in every industry, have seen their sensitive internal data lost, stolen or leaked to the outside world. High-profile leaks, like that of Edward Snowden, made headlines and struck fear into many companies worried that disgruntled employees could walk off with documents or data that would result in tremendous damage to their brand and reputation if made public. These risks are pervasive across the organization – not just with unhappy employees -- and particular attention needs to be paid to those who have access to the most sensitive information. Often overlooked are the C-suite and board of directors, who may approve corporate data policies but are never trained on them, and who likely have the most unrestricted access to data and access to information that the IT team may not know exists. In this slideshow, Diligent looks at what information is at the greatest risk when an executive or board member leaves.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.