{"id":1237,"date":"2015-09-29T14:48:57","date_gmt":"2015-09-29T18:48:57","guid":{"rendered":"http:\/\/209.208.108.186\/?p=1237"},"modified":"2015-09-29T14:48:57","modified_gmt":"2015-09-29T18:48:57","slug":"ex-user-credentials-haunting-your-network","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/","title":{"rendered":"Ex-user credentials haunting your network?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-1238\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\" alt=\"insider_threat\" width=\"328\" height=\"232\" \/><\/a>\u201cJoe\u201d left two weeks ago. Are his user credentials still appearing active? Maybe because IT is backed up on \u201coffboarding?\u201d Or, maybe they don\u2019t even know he is gone yet!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to a survey done by Lieberman Software, \u201c<\/span><span style=\"font-weight: 400;\">More than 13% can still access a previous employers&#8217; systems using their old credentials.\u201d <\/span><span style=\"font-weight: 400;\">This means the information that \u201cJoe\u201d had access to as a privileged employee, is still available\u2026to him\u2026right now&#8230;from outside the company. And most likely, many have that access for a rather long period of time. \u201cAlmost 25% work in organizations that do not change their service and process account passwords within 90 days,\u201d stated the Lieberman Software survey. In the days of paper, it didn\u2019t seem to matter that an old employee\u2019s name still showed as a project manager on a document. Nowadays, this can not only cause confusion, it can pose serious risks to the company\u2019s data, network, and reputation. Most employees or contractors do not pose a threat, but it is that one that you may miss that will have access to material with devastating consequences. Kentucky.com reported the following example in 2014 on the sentencing of an ex-contractor gaining access to Toyota\u2019s systems: \u00a0\u201c&#8230;<\/span><span style=\"font-weight: 400;\">caused considerable downtime or loss of functionality with a number of systems, affecting Toyotasupplier.com the most, according to court documents. Several Toyotasupplier.com and internal applications did not work properly or shut down for hours, according to the affidavit.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many companies are so busy with other tasks and decisions, the simple cleanup of the obvious things go unnoticed. We all have so many different access points to so many different applications today, that keeping track ourselves is overwhelming, but IT has to keep track of everyone\u2019s access. Communication is the number one task to protect a company from data loss or threat risk. Tell IT&#8211;they can\u2019t purge the system and protect the company if they are not kept informed. Today, IT is one of the most important departments for the functionality, security\u2026 lifeblood\u2026of an organization. They should be first on the list. With access to comprehensive monitoring and reporting tools, IT can run a investigative query on demand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What needs to be done to help protect your privileged information and network no matter where your data is located? The following should be at the top of the list:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure your internal process of employee onboarding and offboarding has IT included at all levels.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure your corporate policy is understood and signed off on when an employee is hired and again when discharged.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Confirm that this policy clearly<\/span><span style=\"font-weight: 400;\"> informs all employees that their actions, while using company devices, are logged, monitored, and audited.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Verify that all users, including contractors, have their own, unique login credentials.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Validate that your IT procedures include all levels of employee information access, especially privileged accounts. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make certain a corporate policy for discharging an employee has immediate impact on any access for that employee, even one day could be detrimental.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do not forget about social media. Many view this as a harmless side effect of today\u2019s business world. It is not harmless. A disgruntled employee can do serious damage to a company\u2019s reputation through this ever-increasing communication channel. Access to the company\u2019s social media needs to be regulated just like any proprietary corporate network.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Lastly, audit&#8230;audit&#8230;audit. Use a comprehensive monitoring tool with detailed, drill-down capability to analyze data on any activity. It is always good practice to regularly screen for activity on users who are no longer with the company. Investigate any missed credentials and correct the issue before data loss, malware intrusion, or simple unethical behavior, such as accessing and posting on the company social media sites, happens. This is the only way to ensure that all avenues were covered. <\/span><span style=\"font-weight: 400;\">Today, monitoring, filtering, and reporting solutions are no longer a luxury&#8211;they are a requirement.<\/span><\/p>\n<p><a href=\"https:\/\/www.wavecrest.net\/\"><span style=\"font-weight: 400;\">Wavecrest Computing<\/span><\/a><span style=\"font-weight: 400;\"> has been the recognized leader in Web Security for over 19 years with CyBlock and Cyfin Solutions. These scalable filtering and forensic reporting analysis products are designed to enable organizations to successfully address Internet abuse, legal liability, shadow IT, workforce productivity, and Web security threats.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cJoe\u201d left two weeks ago. Are his user credentials still appearing active? Maybe because IT is backed up on \u201coffboarding?\u201d Or, maybe they don\u2019t even know he is gone yet! According to a survey done by Lieberman Software, \u201cMore than 13% can still access a previous employers&#8217; systems using their old credentials.\u201d This means the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[205],"tags":[502,501],"class_list":["post-1237","post","type-post","status-publish","format-standard","hentry","category-industry-news","tag-offboarding","tag-onboarding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ex-user credentials haunting your network? - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ex-user credentials haunting your network? - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"\u201cJoe\u201d left two weeks ago. Are his user credentials still appearing active? Maybe because IT is backed up on \u201coffboarding?\u201d Or, maybe they don\u2019t even know he is gone yet! According to a survey done by Lieberman Software, \u201cMore than 13% can still access a previous employers&#8217; systems using their old credentials.\u201d This means the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-29T18:48:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Ex-user credentials haunting your network?\",\"datePublished\":\"2015-09-29T18:48:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\"},\"wordCount\":703,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\",\"keywords\":[\"offboarding\",\"onboarding\"],\"articleSection\":[\"Industry News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\",\"name\":\"Ex-user credentials haunting your network? - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\",\"datePublished\":\"2015-09-29T18:48:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ex-user credentials haunting your network?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ex-user credentials haunting your network? - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/","og_locale":"en_US","og_type":"article","og_title":"Ex-user credentials haunting your network? - Wavecrest Blog","og_description":"\u201cJoe\u201d left two weeks ago. Are his user credentials still appearing active? Maybe because IT is backed up on \u201coffboarding?\u201d Or, maybe they don\u2019t even know he is gone yet! According to a survey done by Lieberman Software, \u201cMore than 13% can still access a previous employers&#8217; systems using their old credentials.\u201d This means the [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2015-09-29T18:48:57+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Ex-user credentials haunting your network?","datePublished":"2015-09-29T18:48:57+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/"},"wordCount":703,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg","keywords":["offboarding","onboarding"],"articleSection":["Industry News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/","url":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/","name":"Ex-user credentials haunting your network? - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg","datePublished":"2015-09-29T18:48:57+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/09\/insider_threat.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/ex-user-credentials-haunting-your-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Ex-user credentials haunting your network?"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1237"}],"version-history":[{"count":2,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1237\/revisions"}],"predecessor-version":[{"id":1240,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1237\/revisions\/1240"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}