Security Review: Does your business have old logins for ex-staff? • Blisstech Solutions

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks that you forget to delete their login details.

It’s easy to overlook. You’ll get around to it later, right?

However, unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. Paying for old subscriptions you no longer need can also be an unnecessary drain on your budget.

A recent report found that almost half of businesses had accounts that were no longer actively managed.

If you forget about an account, you are not monitoring it, which leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details your business uses. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive).

The same goes for any software or service you’ve stopped using in your business. You might not realise you’re still paying for a service you haven’t touched in months – or even years.

Going forward, ensure a clear process for when people leave and regularly review the applications and services your business uses.

If you’re unsure where to start, let us help you perform a security review and ensure you’re not exposing your business to unnecessary threats. Get in touch.

More Content

If it ain’t broke… Windows update makes signing out simple again

Windows update makes is easy to sign out of Windows 11 again

Having trouble finding the sign out button in Windows 11? You’re not the only one! Luckily, Microsoft have listened… find out more here.

Ransomware Attacks Grow for Small Businesses

Two organisations have recently released reports on the state of ransomware and cybersecurity incidents affecting small businesses. Datto's State of the Channel Ransomware Report Datto has recently released their "State of the Channel Ransomware Report"  for 2019...
Shady character in a mask sitting by computer screens

A new zero-day vulnerability in Windows

Introduction A new zero-day vulnerability in Windows Search has been discovered which can be exploited to automatically open a malicious search window containing remotely-hosted malware executables. The vulnerability is triggered when a user launches a Word document,...

Tech Tip: How to use Microsoft Teams as a phone system

Welcome to a new Tuesday tech tip video. In it, I will demo the Microsoft Teams Phone system. Microsoft Teams has become a cornerstone for collaboration, offering seamless chat and meeting experiences for millions of users worldwide. But did you know that Teams can...

Tech Tip: How to create a voting poll using Outlook

Welcome to a new Tuesday tech tip video where we will be exploring how to create a voting poll using Outlook and Microsoft Forms. Sometimes, when we need to get people's opinions on something, it can be a bit like herding cats! Maybe we need to get a consensus of...
Security Awareness Training Thumbnail Image

Human Error: The Achilles’ Heel of Your Cybersecurity

Small and medium-sized businesses (SMBs) are prime targets for cyberattacks, and the most vulnerable element in their defence is their workforce. Effective cybersecurity awareness training is essential for every employee across your organisation. But to implement it...

Tech Tip: How to Share Large Files for Free with WeTransfer

Welcome to a new Tuesday tech tip video where I will show you how to transfer large files using WeTransfer. Do you ever have trouble sending large files through email? Email servers have size limits, so you can't just attach a big file and send it off. This can be a...
@ symbol with a hook through it

Anti-virus programs aren’t enough

Today, many business owners install an antivirus program as their single line of defence and call it a day. However, there are many ways to get into a network that circumvents anti-virus. Hackers are creating malware faster than anti-virus programs can recognise them...
Logos for Microsoft 365

The Microsoft New Commerce Experience (NCE) is on the way

Microsoft is introducing what it calls a New Commerce Experience (NCE) in 2022, with changes to licensing terms and pricing for Microsoft 365. This will mean fairly big, and potentially expensive, changes for business customers who have Microsoft 365 licences. The...
Say goodbye to video call pop-ups (and Teams meeting blushes)

Say goodbye to video call pop-ups (and Teams meeting blushes)

Has a pop-up notification ever embarrassed you while you were on a video call? Microsoft may finally have a feature to stop that happening. Learn more here.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05