Half of staff have too much access to data • Blisstech Solutions

Here’s a question to make you pause: Do you know exactly who in your business can access your critical data right now?

And more importantly, do they need that access to do their job?

If you’re like most business owners, you probably assume that access is sorted out during setup and that’s the end of it. But new research says otherwise.

It turns out that around half of staff in businesses have access to far more data than they should.

Which is a big problem.

Not just because of the risk of someone doing something malicious, but because mistakes happen. When people can see things they don’t need, it opens the door to accidents, breaches, and headaches with compliance and audits.

This is what’s known as insider risk.

It simply means the risk that comes from people inside your business, whether they’re employees, contractors, or anyone else who has access to your systems.

Sometimes insider risk is deliberate, like when someone steals data.

But far more often it’s unintentional. Someone clicks on the wrong thing, sends information to the wrong person, or keeps hold of access when they leave the business. And that’s when trouble starts.

One of the biggest issues is what’s called “privilege creep”.

That’s where people gradually build up more access than they really need, often because they move roles, get added to new systems, or no one takes a close look at what they can see.

The research shows that only a tiny percentage of businesses are actively managing this properly. And that means huge amounts of data are being left exposed.

Even scarier, nearly half of businesses admit that some of their ex-staff still have access to systems months after leaving. That’s like leaving the keys to your office in the hands of someone who no longer works for you.

The solution is to make sure your people can only access what they need, and nothing more. This is often called “least privilege”.

It means setting up systems so that permissions are limited to what’s necessary. And access is only given temporarily when required. That’s sometimes referred to as “just in time” access.

And just as important, when someone leaves your business, all their access should be removed straight away.

Today’s world of cloud apps, AI tools, and “invisible IT” (where software is used without IT even knowing about it) makes this trickier. But it’s not impossible. It just means being proactive.

Regularly reviewing who has access to what, tightening permissions, and using tools that help automate this can make a huge difference.

The aim isn’t to slow people down. It’s to protect your data, your customers, and your business’s reputation.

If you need help assessing the security of your access controls, we offer solutions that make this process easier, so please get in touch. It’s better to know now than after a breach.

More Content

Tech Tip: Master Your Multitasking – Switching Apps and Desktops Like a Pro

Welcome to a new Tuesday tech tip video where I will show you how to switch between applications and desktops in Windows quickly. Sick of losing track of what you're doing because you have too many windows open? Let's face it: we've all been there. Well, this video is...

Is your security focusing on the right things?

A new study shows that only a third of businesses place detection as their main priority, while two thirds say prevention is their primary focus.

Managed IT Services consultant connects a network cable into switch

What are the benefits of outsourcing IT support?

Have you ever started a DIY task only to wish you had just called in an expert?  Your IT support should be no different. Many business owners think that they can handle their IT systems themselves.  However, unless they have the experience and finger on the pulse of...
New! A better way to find Chrome extensions

New! A better way to find Chrome extensions

The Chrome Web Store’s been given a massive makeover, and it’s all about making your team’s life easier. We have all the details.

Tech Tip: How to share files securely in Teams

Welcome to a new Tuesday tech tip video where we will be exploring how to share files securely with people outside of your organisation using Microsoft 365 and Teams. Microsoft Teams is a powerful tool that allows for seamless collaboration and communication within an...
The anatomy of a cyber ready business

Cyber Readiness: How to Build a Business That’s Tough to Hack

Why Cyber Readiness Matters Cyberattacks aren’t just a problem for big corporations — cybersecurity for small businesses a growing threat too. A single breach can disrupt operations, damage your reputation, and cost you money. The good news? You don’t need a huge...
How to use Browser Profiles thumbnail

Tech Tip: How to use browser profiles

This Tech Tip is on how to use web browser profiles. If you are a freelancer, virtual assistant, or just wear many hats in your job role, you probably have multiple different logins for the same application. As so many applications are web-based, we have to login to...

Tech Tip: Send quick Teams messages from anywhere

We all know that Teams messaging is a great way to communicate with others, but it can be disruptive if it interrupts our flow. Even though Teams messaging is a great way to communicate with colleagues, it can easily break your concentration and flow. You might find...
Passkeys will be better integrated in Windows

Passkeys will be better integrated in Windows

Big changes are coming to Windows 11 to make logging in safer and easier. Which is why now’s the time to get ready for a password-free future…

How to reopen a closed browser tab thumbnail

Tech Tip: How to quickly reopen a closed browser tab

Welcome to a new Tuesday tech tip video, and it's a really quick, but useful one This video shows how to quickly reopen a closed browser tab in Google Chrome or Edge. The video demonstrates a keyboard shortcut (Ctrl+Shift+T) to restore the last closed tab. I will also...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05