world of internet security, latest cyber security news,information,updates on technology,it job vacancies,internet security,breaches,and safeguards

Tuesday 16 December 2014

How Disgruntled Employees Can Damage The Business

with 0 Comment
How Disgruntled Employees Can Damage The Business 

Employees come and go throughout the time that you run your business, and sometimes these relationships may end with a bad taste in the mouth for the employee, employer, or both.
In today’s world, it is important to account for every possible tie the employee might have to the company. It is easy to think of the traditional thingssuch as a company laptop or office keysbut access to the company blog or Customer Relation Management (CRM) might not come to mind, which is where these employees can cause damage.

This is sometimes referred to as rogue access, and an employee doesn’t necessarily need to be terminated to cause troublean upset or unethical employee can be just as devastating to your business, as AT&T learned with its data breach in October.
CRM tools typically include customer data, such as email addresses, phone numbers and company decision makers. Therefore, unauthorized access to the company CRM is basically giving an upset employee the keys to the kingdom to cause chaos among customers, or worse, handing them a lead list for their new employer to try to steal your client base.

For an employee more inclined to cause chaos, they might send spam emails to these customers designed to tarnish the reputation of your organization. For an employee that is leaving the company, however, they might take things a step further and sell your client list to competitors or use it themselves if they are recruited by a competitor.
How can these scenarios be avoided?
This can be done by segmenting CRM access – there is no good reason for a salesperson to have access to all accounts, and employees in other divisions should only have access to the information they need. Hence, sharing usernames and passwords shouldn’t be an acceptable policy, as it spreads the number of people who could potentially cause trouble.

But issues go beyond employees actively causing trouble. You might have an employee who left on good terms but the sheer fact that they can still access company data can be a big issue, especially if you are in a field that is heavily regulated, such as health care or finance. If an auditor checked credentials for terminated employees or employees that should no longer have access to said data and the credentials still functioned, this would most likely violate the regulations for the field in question, resulting in fines or penalties.

Finally, be sure to properly manage and audit any shadow IT or the use of applications in the company that might not be authorized and managed by IT. This includes but isn’t limited to products like DropBox, Gmail and even USB drives. These three things can all easily take data out of company hands and put it in a place that an employee can store at home and use at any point in time, whether they are still employed by the company or not.

Depending on the data the employee works with, these applications should be blocked or restricted. Otherwise, education plans should be in place to ensure that employees are not using them in ways that can hurt the company. Better yet, the company should strive to provide similar services to eliminate the employee’s want or need to use these services, making shadow IT a moot point.

0 comments:

Post a Comment