{"id":2349,"date":"2004-10-20T00:00:00","date_gmt":"2004-10-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/20\/ex-staff-pose-threat-to-data\/"},"modified":"2021-12-30T11:41:07","modified_gmt":"2021-12-30T11:41:07","slug":"ex-staff-pose-threat-to-data","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/20\/ex-staff-pose-threat-to-data\/","title":{"rendered":"Ex-staff pose threat to data"},"content":{"rendered":"<p>One in five businesses run the risk of sensitive information falling into the hands of competitors by failing to remove access rights of former employees, research shows.  Some 23 per cent of companies are leaving corporate networks exposed to the threat of data theft and attacks by former staff by failing to revoke former staff IT access rights for weeks, months and in some cases years after the have left, according to research from Citrix.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The survey of 1,400 IT professionals shows that email access is the business tool most at risk when it came to ex-employees trying to access information remotely.  <\/p>\n<p>But confidential company documents, contact databases and administration systems were also at high-risk.  &#8216;Firms need to build in rules saying what people can and can not access from the corporate network,&#8217; said Thomas Raschke, IDC&#8217;s programme manager for European security products and strategies.<\/p>\n<p>&#8216;Access management is often an overlooked part of the business.&#8217;<\/p>\n<p>http:\/\/www.vnunet.com\/news\/1158871<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2349","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2349"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2349\/revisions"}],"predecessor-version":[{"id":4836,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2349\/revisions\/4836"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}