When Was the Last Time You Checked Your Computer Network’s User Accounts?

marketingteam Blog

Review User Accounts

Securing a business’s network so often requires putting safeguards in place against external threats that it’s often easy to forget that many threats of equal or greater importance can occur from inside the corporation as well. Identity theft and corporate espionage are growing concerns across all sectors, and there are a variety of ways for people to earn money by participating in such activities.
 

Employees are often used as a tool in ensuring greater security, as they’re the front line against social engineering attacks and can keep an eye out for suspicious activity, but that doesn’t mean they’re automatically trustworthy. Workers that are unhappy or who are moving on to a different business will often have access to some of the company’s most sensitive data, and it wouldn’t be difficult for them to sell it off to willing parties if you make it easy enough for them.

It’s critically important that any employees who have put in their notice or who are in the process or being laid off or fired have their accounts closely reviewed and restricted. If it’s at all possible, try to disable their access before they’re even out of the building, although that would have to be done on a case by case basis. This is a very successful policy that will help keep data inside of the company and mitigate any damages lost by currently occurring leaks.

Call ENTRUST today if you would like to look at network setup and permissions for your San Antonio company!