Security Review: Does your business have old logins for ex-staff? • Blisstech Solutions

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks that you forget to delete their login details.

It’s easy to overlook. You’ll get around to it later, right?

However, unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. Paying for old subscriptions you no longer need can also be an unnecessary drain on your budget.

A recent report found that almost half of businesses had accounts that were no longer actively managed.

If you forget about an account, you are not monitoring it, which leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details your business uses. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).

The same goes for any software or service you’ve stopped using in your business. You might not realise you’re still paying for a service you haven’t touched in months – or even years.

Going forward, ensure a clear process for when people leave and regularly review the applications and services your business uses.

If you’re unsure where to start, let us help you perform a security review and ensure you’re not exposing your business to unnecessary threats. Get in touch.

More Content

Say goodbye to hours wasted on PowerPoint slides

Say goodbye to hours wasted on PowerPoint slides

PowerPoint presentations still hold a firm place in many business meetings. But, let’s be honest, they’re a real pain to create. If you regularly use PowerPoint, Microsoft’s got a solution you’ll love…

Unwrap the gift of knowledge: 5 free AI courses by Microsoft

Unwrap the gift of knowledge: 5 free AI training courses by Microsoft

Microsoft has a little business-boosting gift that you won’t want to miss out on… five free courses about AI. We have the details, and the links to the courses.

Getting Started With Microsoft Teams

Microsoft Teams is a powerful collaboration tool and is included with all business versions of Microsoft 365.  If you have Microsoft 365, and are not using Teams, or you don't yet have Microsoft 365 and want to know what Teams can do, this video is a quick...
Power Automate and Flows Thumbnail

Tech Tip: What is Microsoft Power Automate?

Welcome to a new Tuesday tech tip video where I will give you a quick introduction to Microsoft Power Automate. We all want to streamline our work life and make ourselves more productive. Well, if you use Microsoft 365, you can do just that by using Power Automate....

Tech Tip: How to use Mail Merge

This Tuesday Two Minute Tech-tip shows you how to automate customised emails and letters using Mail Merge. Imagine; you need to send a letter or email to 10s, or even 100s of people with the same base content, but personalised for each recipient. You could manually...
Beware that “support call” – it could be a ransomware scam

Beware that “support call” – it could be a ransomware scam

Would your employees give an unknown caller access to your business devices? But what if they got a Teams chat from someone posing as Microsoft support? Here we tell you all about a new ransomware scam

Tech Tip: How to create a scheduling poll using Outlook

Welcome to a new Tuesday tech tip video where we will be exploring how to create a scheduling poll using Outlook. You know what it's like when you are trying to get everyone together for a meeting. Trying to find a time that suits everyone can be a real pain! There...
1 in 4 people struggle with password overload. Here’s the answer

1 in 4 people struggle with password managment. Here’s the answer

Struggling from password overload? You’re not alone, and it’s putting your business at risk of data theft. Good news: There’s a very simple solution and we’ll tell you all about it.

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.

A woman on a laptop with a shield and lock on the screen

7 ways to secure small business IT

It is hard enough running a business without having to worry about how to ensure your computer systems and data are secure from bad guys.  To help you out, we have put together a list of the top 7 things that you should do to secure your small business IT systems. 1....
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05