In addition, 16% (1 in 6) said they used old user IDs and passwords to access a former employer's computing systems.
"Nearly 1 in 5 (19%) of those who work in an office setting would take company information like customer data, price lists or product plans...16% percent (1 in 6) have been able to use old user IDs and passwords to access a former employer's computing systems.."These finding highlight the significant data theft risk to an organization and make it critical to know who and when employees, contractors, and partners/vendors access a company's data.
- Harris Interactive survey
To address these issues organizations are utilizing Identity Access Intelligence (IAI) - low-cost on-demad SaaS analytics service for in-depth reports on user access compliance, attestation, and proactive data breach detection, even by authorized users.
Download a white paper on user access compliance and proactive data breach detection. Learn how to proactively identify unauthorized breaches of corporate data, even by authorized users - with no hardware and no on-site software.Sources:
(a) Is ‘Man of Steal’ Now Playing At Your Company? - Courion,07/18/2013