Security Review: Does your business have old logins for ex-staff? • Blisstech Solutions

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks that you forget to delete their login details.

It’s easy to overlook. You’ll get around to it later, right?

However, unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. Paying for old subscriptions you no longer need can also be an unnecessary drain on your budget.

A recent report found that almost half of businesses had accounts that were no longer actively managed.

If you forget about an account, you are not monitoring it, which leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details your business uses. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).

The same goes for any software or service you’ve stopped using in your business. You might not realise you’re still paying for a service you haven’t touched in months – or even years.

Going forward, ensure a clear process for when people leave and regularly review the applications and services your business uses.

If you’re unsure where to start, let us help you perform a security review and ensure you’re not exposing your business to unnecessary threats. Get in touch.

More Content

How to plan a big IT project

We all dream of making changes to our business that will make us more efficient and profitable, but significant changes to the technology you use to run your business should never be rushed.

How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business.
Why?
Because cyber criminals are getting smarter than ever before. If they manage to crack just one password, they could gain access to your sensitive business data, financial information, or even gain control of your entire system.
Cyber criminals use automated tools to guess passwords, allowing them to try out millions of combinations in seconds. So, if you’re using something like “Password123” or “CompanyName2025”, you’re practically handing them the keys to your business.
A compromised password can lead to big issues, such as:
• Data breaches
• Financial losses
• Identity theft
• Reputation damage
But how do you create strong passwords without driving yourself (and your team) mad?
Think of your password like a secret recipe, where only you should know the ingredients. It should:
• Be at least 14 characters long (the longer, the better)
• Include a mix of uppercase and lowercase letters
• Contain a few numbers and symbols (like @, $, %, or &)
• Not contain any common words or easily guessable information (like birthdays, names, or the word “password”)
Instead of using a single word, you could try a passphrase – a short, random sentence that only you would understand. For example, instead of “Sailing2025”, try something like “Coffee&CloudsAreGreat9!”. This is much harder to crack, yet still easy to remember.
You should also steer clear of these common mistakes:
• Using personal info (your name, birthday, business name, etc.)
• Reusing the same passwords across multiple accounts
• Using simple sequences (“123456” or “abcdef”)
• Storing passwords in an easily accessible place (like a sticky note on your desk)
If remembering unique passwords for every account sounds impossible, there is another option: Password managers. These generate strong passwords, store them securely and autofill them for you.
With a password manager, you only need to remember one strong master password for the manager app itself. The rest are encrypted and stored safely, reducing the risk of data breaches.
Even the strongest password isn’t foolproof, which is why multi-factor authentication (MFA) is also important. MFA requires a second form of verification, like a one-time code sent to your phone or generated from an authentication app.
If you have employees accessing your business systems, it’s a good idea to have a password policy in place to explain your rules and why they’re important. This should include:
• Unique passwords for each system and account
• Regular security training on password best practices
• Business-wide use of MFA for critical systems
• Scanning for compromised passwords regularly
By making password security a priority, you can reduce the chances of a cyber attack creating a nightmare for your business.
And if you need help making your business more secure, get in touch.

Here’s how to fix that Windows 11 File Explorer glitch

Here’s how to fix that Windows 11 File Explorer glitch

Is your business running version 24H2 of Windows 11? You might be experiencing a small but annoying glitch when clicking “See more” in File Explorer. Here’s how to fix it.

How to use footnotes and endnotes in Word

Tech Tip: How to use footnotes and endnotes in Word

This Tech Tip is another tip for Microsoft Word. If you use Word to write documentation, contracts or any other type of detailed document, then this tip is for you. Usually, when you write such a document, you may need to expand on certain sentences without making the...

How Copilot Wave 2 can boost your business

Imagine how different your business would be without Microsoft 365’s suite of apps and tools. It’s a business essential that makes everything easier. Now imagine these apps and tools could do more. Imagine they could summarise reports, documents, and meetings. Or...
How to use Format Painter thumbnail

Tech Tip: How to use Format Painter in Office 365

Welcome to a new Tuesday tech tip video where we will show you how to use a feature of Office applications called Format Painter. If you want to know how to quickly make the content of your Office documents look consistent, then this video will show you how. Format...
Could automation save you from spreadsheet headaches?

Could automation save you from spreadsheet hell?

Spreadsheets slow us down and are too easy to mess up. So, what if I told you there’s a better way to handle data in your business?

How to use Browser Profiles thumbnail

Tech Tip: How to use browser profiles

This Tech Tip is on how to use web browser profiles. If you are a freelancer, virtual assistant, or just wear many hats in your job role, you probably have multiple different logins for the same application. As so many applications are web-based, we have to login to...
Are your employees reporting security issues fast enough… or even at all?

Are your employees reporting security issues fast enough… or even at all?

The faster your employees report a potential cyber security issue, the less damage is done to your business. But how can you encourage quick reporting? Here we share some solid ideas.

Tech Tip: How to Tidy up Copied Data in Excel

This Tuesday Two Minute Tech-tip shows you how to tidy up data in Excel spreadsheets. Do you have data in a messy format and need to change it so it is organised? Have you ever received data in Excel or in a text file or Word document and wanted to change it from rows...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05