(888) 995-1660

Symmetry Managed Services Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Posted by on in Best Practices

SHOCK: 66% of Fired Employees Able to Access Their Former Company’s Cloud Data

b2ap3_thumbnail_rogue_ex_employees_400.jpgEvery business executive knows the struggle of employee turnover. Your employees might come and go, but your data is one thing that you can’t afford to lose from your business. You might feel that you can trust all of the employees who have put in years of effort to ensure your organization stays afloat, but you may be surprised to learn that a significant number of them will probably leave your company with at least some corporate data.

As reported by SailPoint, at least a quarter of your employees will take copies of corporate data with them when they leave your organization. This survey dealt specifically with cloud computing usage, and was issued to around 3,000 employees worldwide. As explained by SailPoint president Kevin Cunningham, “The survey results are an eye-opener of how cloud applications have made it easy for employees to take information with them when they leave a company.”

If you think about it, this number isn’t so surprising. With the popularity of Bring Your Own Device (BYOD) policies increasing over time, employees are able to make off with copies of your business’s precious files, even unintentionally, much easier than before.

In fact, one out of every five employees has the intention of uploading corporate data to the cloud via Google Docs, Dropbox, or another service, and share this information with those outside the organization. It can feel disheartening that your trusted team would consider doing this, but it’s important to realize that not all employees will do so. The staff you really need to watch out for are the ones who storm out of your office in a fit of rage.

Here are some more statistics from the survey:

  • 66 percent of employees said they were able to access a business' cloud storage applications after they left their last job.
  • 60 percent said they were aware that their employer strictly forbids taking intellectual property when they leave the company.
  • Only 28 percent said their employer's corporate policies describe who can access mission-critical software-as-a-service (SaaS) apps.

How does your IT department plan on handling this issue? Employees potentially stealing sensitive data isn’t something that should be ignored. You need to enact policies that restrict access and user permissions in order to minimize the chance that a rogue employee will contribute to corporate sabotage. It’s vital that you take initiative to restrict your network from terminated employees as soon, or possibly even before, they find out they won’t be working for you anymore.

If you’re concerned about rogue employees leaving with your hard-earned data, or if you want to bolster your network security practices in general, give Symmetry Managed Services a call at (888) 995-1660 .

Symmetry Managed Services CEO Dan Tracy has spent the past 15 years providing technology consulting to small and mid size businesses.


  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Monday, 01 June 2020

Tag Cloud

Bring Your Own Device Passwords Payment card Networking SSID Data Protection Office 365 Printer Big Data Internet Exlporer Google Assistant Audit SharePoint Computing WiFi Lithium-ion battery Samsung Data loss Microsoft Smart Devices Adobe Laptop Windows 7 Covid-19 USB Best Practices Computers Managed IT Services Proactive Data Management Biometrics Unsupported Software Disaster REcovery Screen Mirroring Managed Services Provider Troubleshooting Hard Disk Drive Smartwatch Bandwidth Data Storage Data Security Server PDF Wasting Time BYOD Legal Workplace Tips Books Productivity Inventory Running Cable Information Hyperlink Touchpad Security eWaste Mobile Security Advertising Accessory User Error CrashOverride Flexibility Amazon Technology Password Manager Spam Productivity Innovation Sabotage IT solutions Retail Distributed Denial of Service Mobile Device Windows 10 Business Intelligence eCommerce Windows Network Computer Care Scam Charger Sync Benefits Maintenance Work/Life Balance Application HIPAA Vulnerability Evernote Antivirus Travel Google Drive Vendor Management Alexa for Business Gamification Voice over Internet Protocol Automation Access Best Available Mobile Devices Cleaning Virtualization Cortana Employee Search Myths User Small Business Company Culture Text Messaging Remote Work Data Privacy Encryption Managed IT Service Windows Server 2008 R2 Websites Wireless Internet Hosted Solutions iOS Alert Hacker Wearable Technology Payroll WIndows 7 PC Emails Hardware PowerPoint CRM Phone System Hard Drives BDR Storage Computer Workplace Tips Tip of the Week Thank You Proactive IT Law Enforcement Virus Marketing Memory Vendor Television Gadgets Blockchain ROI Chrome Credit Cards Business Management Router Facebook Privacy AI Device security Medical IT Holiday Smartphone disaster Recover Conferencing Identities SaaS Data recovery Politics Emergency Word Cast Software Browser Updates Paperless Office Data Theft Entertainment Smart Device Solid State Drive Management Congratulations HaaS Operating System App store Camera Gmail Printing Devices Processor Bloatware Sports Hosted Solution Wireless Charging Hard Drive Robot Projects Save Time Internet Service Provider Peripheral History Training Relocation Science Email Internet of Things Identity Theft Telephone Wi-Fi Keyboard Shortcuts Hackers Computer Accessories Windows 10 Internet Licensing Instant Messaging Quick Tips Near Field Communication Display Regulation Excel Criminal Trending Avoiding Downtime Transportation Spyware Development Android Windows Server 2008 Upgrades Social Mobile Device Management Saving Time Two-factor Authentication Administrator Hosted Desktop Telephony Disaster Safety Reputation Administration Digital Signage Uninterrupted Power Supply Threats Root Cause Analysis Information Technology Customer Service IT Services IT Support Scam NFL Data Printers Fiber Optics Tip of the Week Apps Update project management Risk Management Regulations Education Financial Miscellaneous Google Maps Health Managing Stress Meetings Best Practice Net Neutrality Managed IT services Phishing DDoS Collaboration IT budget Managed Service Provider Private Cloud Google Docs Outsourced IT Compliance WannaCry Phising Business Technology IT Support Communitications Identity Wireless File Sharing Sales Smart Technology Efficiency Computer Forensics Software as a Service Malware Edge Workers VoIP Co-Managed Services App Windows Ink Automobile Worker Commute Government FAQ Remote Computing Cloud Computing Cybersecurity Virtual Private Network webinar Microsoft Excel Microsoft Word E-commerce Human Resources Firewall Keyboard iPhone Office Tips Mobility Branding Touchscreen Managed Service 5G Apple Ransomware Printer Server Testing Experience Mobile Computing Netflix Humor Micrsosoft Facebook intranet communications Cost Management Recovery Upgrade Consultant Business Computing Scalability Server Maintenance Patch Management HBO IT consulting IT Services Wireless Technology Holidays Cameras Backup Downtime Benchmarks Network Security Communication Telephone Systems Social Media Fraud Network Secuirty Budget Break/Fix Windows 10s Copiers Money Gifts Business Continuity User Tips Network Congestion Data storage Remote Workers Chromecast Analytics Hiring/Firing Privacy Tech Support Shortcut Machine Learning Mobile Office Social Engineering Worker Employee-Employer Relationship Personal Information Streaming Media IT Support Language Presentation Microsoft Office Bluetooth YouTUbe Teamwork Employer/Employee Relationship Tablet Artificial Intelligence Chromebook Payment Cards Hacking Outlook Unified Threat Management VPN Customer Relationship Management Tablets Black Market Tech Term Legislation Computer Smartphones Mouse Admin Settings End of Support Hybrid Cloud Augmented Reality Office Scams Data Breach Google How To Employer-Employee Relationship The Internet of Things Battery Workplace Electronic Medical Records Saving Money Business Strategy Data Backup Virtual Assistant Computer Fan Music Tips Tip of the Week Nanotechnology Fax Server Current Events OneDrive Cloud Value Managed IT Remote Monitoring Commerce Save Money Business Password Going Green Comparison Cybercrime Investment OneNote Video Games Users Access Control Files Applications Virtual Reality IT Management

Mobile? Grab this Article!


Support Options

  • Phone Support >

    You're human, and your support should be too. Speak to a support team member on the phone now!

    Help Desk: (866) 520-6414

    Phone: (888) 995-1660

  • Ticket By Email >

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal >

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1