Security Review: Does your business have old logins for ex-staff? • Blisstech Solutions

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks that you forget to delete their login details.

It’s easy to overlook. You’ll get around to it later, right?

However, unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. Paying for old subscriptions you no longer need can also be an unnecessary drain on your budget.

A recent report found that almost half of businesses had accounts that were no longer actively managed.

If you forget about an account, you are not monitoring it, which leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details your business uses. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).

The same goes for any software or service you’ve stopped using in your business. You might not realise you’re still paying for a service you haven’t touched in months – or even years.

Going forward, ensure a clear process for when people leave and regularly review the applications and services your business uses.

If you’re unsure where to start, let us help you perform a security review and ensure you’re not exposing your business to unnecessary threats. Get in touch.

More Content

What to do when disaster strikes: Creating an Incident Response Plan

Your business has firewalls, the latest security software, multi-factor authentication, and, of course, uncrackable passwords. You may even have Cyber Essentials—high five. But… It’s still not enough to protect you from 100% of cyber attacks. Completely watertight...
Power Automate and Flows Thumbnail

Tech Tip: What is Microsoft Power Automate?

Welcome to a new Tuesday tech tip video where I will give you a quick introduction to Microsoft Power Automate. We all want to streamline our work life and make ourselves more productive. Well, if you use Microsoft 365, you can do just that by using Power Automate....

5 Reasons why cybersecurity awareness training is a good investment

Cyber attacks are on the rise. Any business that has experienced any form of internet security breach knows that it can be costly in terms of time and money. The reputation of a business is also at stake if client data is compromised. Cybersecurity is an issue that...

Tech Tip: How to Follow Sites in SharePoint

Hello, Happy New Year and welcome to today's Tuesday Two Minute Tech Tip which is about how to find the data you want to access in SharePoint and OneDrive. If you are working with files in Teams and on SharePoint sites, you might wonder why you do not see the sites...
HRMC Crown

The tax relief few businesses know about

A quick summary: When you buy certain new equipment (including computers) you can claim 130% capital allowance What that means: If you spend £1,000 on computer equipment, it'll reduce your corporation tax bill as if you had spent £1,300 How long does it last? It will...

Are your people Christmas shopping from work?

Almost half of people with social media accounts admit to falling for shopping scams. If your team are shopping at work, is your business protected?

Microsoft 365 makes Multi-Factor Authentication easier

Microsoft is planning to enable Multi-Factor Authentication (MFA) directly in its Outlook app for many 365 business users.

Tech Tip: How to use Conditional Formatting in Excel

This Tuesday Two Minute Tech-tip shows you how to automatically add pizzaz to your spreadsheets. Using a feature called 'Conditional Formatting', you can automatically format the cells of your Excel spreadsheet based on what is in them. For example, you can emphasise...
@ symbol with a hook through it

Anti-virus programs aren’t enough

Today, many business owners install an antivirus program as their single line of defence and call it a day. However, there are many ways to get into a network that circumvents anti-virus. Hackers are creating malware faster than anti-virus programs can recognise them...
Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you might think…

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05