(888) 995-1660

Symmetry Managed Services Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in Best Practices

SHOCK: 66% of Fired Employees Able to Access Their Former Company’s Cloud Data

b2ap3_thumbnail_rogue_ex_employees_400.jpgEvery business executive knows the struggle of employee turnover. Your employees might come and go, but your data is one thing that you can’t afford to lose from your business. You might feel that you can trust all of the employees who have put in years of effort to ensure your organization stays afloat, but you may be surprised to learn that a significant number of them will probably leave your company with at least some corporate data.

As reported by SailPoint, at least a quarter of your employees will take copies of corporate data with them when they leave your organization. This survey dealt specifically with cloud computing usage, and was issued to around 3,000 employees worldwide. As explained by SailPoint president Kevin Cunningham, “The survey results are an eye-opener of how cloud applications have made it easy for employees to take information with them when they leave a company.”

If you think about it, this number isn’t so surprising. With the popularity of Bring Your Own Device (BYOD) policies increasing over time, employees are able to make off with copies of your business’s precious files, even unintentionally, much easier than before.

In fact, one out of every five employees has the intention of uploading corporate data to the cloud via Google Docs, Dropbox, or another service, and share this information with those outside the organization. It can feel disheartening that your trusted team would consider doing this, but it’s important to realize that not all employees will do so. The staff you really need to watch out for are the ones who storm out of your office in a fit of rage.

Here are some more statistics from the survey:

  • 66 percent of employees said they were able to access a business' cloud storage applications after they left their last job.
  • 60 percent said they were aware that their employer strictly forbids taking intellectual property when they leave the company.
  • Only 28 percent said their employer's corporate policies describe who can access mission-critical software-as-a-service (SaaS) apps.

How does your IT department plan on handling this issue? Employees potentially stealing sensitive data isn’t something that should be ignored. You need to enact policies that restrict access and user permissions in order to minimize the chance that a rogue employee will contribute to corporate sabotage. It’s vital that you take initiative to restrict your network from terminated employees as soon, or possibly even before, they find out they won’t be working for you anymore.

If you’re concerned about rogue employees leaving with your hard-earned data, or if you want to bolster your network security practices in general, give Symmetry Managed Services a call at (888) 995-1660 .

Symmetry Managed Services CEO Dan Tracy has spent the past 15 years providing technology consulting to small and mid size businesses.


  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Thursday, 17 October 2019

Tag Cloud

Identity Gamification Memory Internet of Things Benefits Managed Service Wireless Technology End of Support App store Excel Identities Quick Tips Access Control Automobile Applications Presentation IT solutions Downtime Credit Cards Humor Voice over Internet Protocol FAQ Payment card Cast Current Events Fraud Personal Information Data loss Computer Fan Video Games Samsung Conferencing Phishing Google Assistant Upgrade Network Security User Worker Commute Google Scalability Windows Ink Bring Your Own Device BDR Data Protection Big Data Data Privacy Managed Service Provider Alert Tip of the Week Audit Windows 10 Automation Science Hosted Solution Business Continuity Update Sabotage Virtual Private Network Chrome Phising Criminal Relocation Training Office Tips Telephony Sync Consultant Apps Charger Small Business iPhone Television Network Congestion Unified Threat Management Antivirus Licensing OneNote Wireless Internet Holiday Marketing Touchscreen Going Green Employer/Employee Relationship Chromebook Application Best Practice Data NFL SharePoint Computers Business Management Collaboration USB Analytics Users Networking Edge Reputation PowerPoint VoIP Politics Management Backup IT Services Vendor Management Emails Windows 7 Workplace Break/Fix Customer Relationship Management Data Backup Wasting Time E-commerce Windows Transportation Augmented Reality Robot Encryption Windows 10 WannaCry Malware Budget Unsupported Software Settings Disaster REcovery Printing Microsoft Excel Data storage IT budget The Internet of Things Innovation Legal Work/Life Balance Hardware Wireless Virus Disaster Efficiency Password Manager Touchpad Remote Computing Recovery Cybercrime Advertising YouTUbe Office 365 Cost Management Cortana Education IT Services IT Support Scam Hyperlink Teamwork Devices Information Technology Business Computing Upgrades Employee Value Sports Private Cloud Fax Server Administrator Customer Service Telephone CrashOverride Cloud Computing Solid State Drive Social Engineering Ransomware Computer Forensics Microsoft Vendor Office Instant Messaging Productivity Compliance Hard Drive Virtual Reality Payment Cards Lithium-ion battery Spam WIndows 7 Mobile Device Managed IT Software Health webinar Microsoft Office Cleaning Laptop Server Business Intelligence Data Storage Data Management Apple Regulations Hiring/Firing Data Theft Software as a Service Word Hacker Running Cable IT consulting Bandwidth Worker project management Root Cause Analysis Regulation Google Maps Avoiding Downtime Accessory App Money Electronic Medical Records Cybersecurity Tech Support Facebook Administration Threats Printer Server Windows Server 2008 R2 Mobile Security Streaming Media Artificial Intelligence Financial Windows Server 2008 Near Field Communication 5G Tech Term Search IT Support intranet Proactive PDF Outlook Amazon Branding Information Printer Best Available Shortcut Updates Remote Monitoring Flexibility Chromecast Password Wireless Charging Hosted Solutions Passwords Android Computer Workplace Tips Tip of the Week Workers Google Drive Save Time Law Enforcement Gadgets Display Data Security Nanotechnology HaaS Computer Entertainment Books Phone System Legislation Computer Accessories Scam Testing HBO WiFi Bluetooth Computer Care Mobility Miscellaneous Communication Retail Processor iOS Machine Learning Mobile Device Management History File Sharing Payroll communications Windows 10s User Tips Trending Peripheral Data recovery IT Management Wearable Technology Medical IT Technology Managing Stress Text Messaging Server Maintenance PC Benchmarks Hacking Investment Network Secuirty Proactive IT Company Culture Human Resources Mobile Devices Business Technology Internet Screen Mirroring Development Productivity Admin Travel How To Managed IT Services Workplace Tips Security Bloatware Black Market Smartphone Evernote Access Mobile Office Safety eWaste Gifts Email Virtualization Storage IT Support Alexa for Business Tablets Tips Tip of the Week User Error Smartwatch Microsoft Word Gmail Netflix Hackers Tablet Telephone Systems Blockchain Thank You Battery Internet Exlporer Projects Saving Time ROI Two-factor Authentication Paperless Office Risk Management Business Smartphones Biometrics Google Docs Identity Theft Commerce Save Money Router Files Government Meetings Comparison Cameras Operating System Social Media Device security SaaS BYOD Mouse Spyware Hard Disk Drive Virtual Assistant Business Strategy Co-Managed Services Micrsosoft DDoS Camera VPN Mobile Computing Keyboard Emergency Hybrid Cloud Computing Cloud Outsourced IT Language Digital Signage Maintenance Best Practices Music Patch Management Saving Money Websites Network Wi-Fi Hard Drives Employee-Employer Relationship Scams OneDrive Uninterrupted Power Supply Keyboard Shortcuts Adobe Remote Workers Social Browser Managed IT services Firewall Distributed Denial of Service Sales Smart Technology Privacy Myths Data Breach SSID Vulnerability Employer-Employee Relationship Congratulations Experience

Mobile? Grab this Article!


Support Options

  • Phone Support >

    You're human, and your support should be too. Speak to a support team member on the phone now!

    Help Desk: (866) 520-6414

    Phone: (888) 995-1660

  • Ticket By Email >

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal >

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1