When an employee leaves your organization, how long afterward are they able to access your company’s systems or use facility keys?
Failure to revoke former employees’ access privileges is a rampant problem across all industries. In a survey of IT decision makers, nearly half of respondents said they were aware of ex-employees who still had access to company applications. Some of these respondents (20 percent) also said that their organization had experienced a data breach as a result of continuing to allow former employees access to company resources.
Just as it’s important to deprovision access to corporate accounts such as email and customer databases, it’s critical to ensure no former employees have access to your key control system by deleting users immediately after they terminate employment.
By following best practices for reducing internal theft — both during and after someone’s employment — you can keep your business secure.