<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: When employees bite back &#8211; Security in organizations</title>
	<atom:link href="http://www.gfi.com/blog/when-employees-bite-back-security-in-organizations/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/when-employees-bite-back-security-in-organizations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=when-employees-bite-back-security-in-organizations</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: David Kelleher</title>
		<link>http://www.gfi.com/blog/when-employees-bite-back-security-in-organizations/comment-page-1/#comment-379</link>
		<dc:creator>David Kelleher</dc:creator>
		<pubDate>Thu, 12 Nov 2009 09:31:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1577#comment-379</guid>
		<description><![CDATA[Thanks John. The statistics are worrying, to say the least. Our own research in September in the US and last month in France shows that SMBs are too trusting and that they pay too little attention to insiders. It also amazing how IT managers can be largely unaware of employee access to their systems. I think this is an area that needs to be addressed much more by the security community.]]></description>
		<content:encoded><![CDATA[<p>Thanks John. The statistics are worrying, to say the least. Our own research in September in the US and last month in France shows that SMBs are too trusting and that they pay too little attention to insiders. It also amazing how IT managers can be largely unaware of employee access to their systems. I think this is an area that needs to be addressed much more by the security community.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: John Mello</title>
		<link>http://www.gfi.com/blog/when-employees-bite-back-security-in-organizations/comment-page-1/#comment-375</link>
		<dc:creator>John Mello</dc:creator>
		<pubDate>Wed, 11 Nov 2009 20:56:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=1577#comment-375</guid>
		<description><![CDATA[While taking appropriate and immediate action when an employee resigns or his or her role is terminated will ensure that security is not compromised, many corporations still underestimate the risks sacked workers pose to their operations. Just how clueless many organizations are to those risks was revealed in a study (http://www.courion.com/company/press_release.html?id=408) released this summer by the Courion Corporation, which specializes in access governance, provisioning and compliance. Among study&#039;s findings were that

--53 percent of IT managers are largely unaware of employee access rights to their systems;

--48 percent of companies take more than one business day to alert their IT departments that an employee has been terminated;

--23 percent of the firms take an additional day or more to switch off a terminated employees access to their systems;

--34 percent of business managers acknowledged it could take up to a week before they were certain a terminated employee&#039;s access ws shut off.

--9 percent of the companies admitted they could never be completely certain they&#039;d cut off their former employees&#039; access.

&quot;These figures suggest that IT administrators may be overconfident in their ability to prevent data breach threats from zombie accounts,&quot; Courion said, &quot;which can cost organizations millions of dollars in damages and tarnish brand reputation.&quot;]]></description>
		<content:encoded><![CDATA[<p>While taking appropriate and immediate action when an employee resigns or his or her role is terminated will ensure that security is not compromised, many corporations still underestimate the risks sacked workers pose to their operations. Just how clueless many organizations are to those risks was revealed in a study (<a href="http://www.courion.com/company/press_release.html?id=408" rel="nofollow">http://www.courion.com/company/press_release.html?id=408</a>) released this summer by the Courion Corporation, which specializes in access governance, provisioning and compliance. Among study&#8217;s findings were that</p>
<p>&#8211;53 percent of IT managers are largely unaware of employee access rights to their systems;</p>
<p>&#8211;48 percent of companies take more than one business day to alert their IT departments that an employee has been terminated;</p>
<p>&#8211;23 percent of the firms take an additional day or more to switch off a terminated employees access to their systems;</p>
<p>&#8211;34 percent of business managers acknowledged it could take up to a week before they were certain a terminated employee&#8217;s access ws shut off.</p>
<p>&#8211;9 percent of the companies admitted they could never be completely certain they&#8217;d cut off their former employees&#8217; access.</p>
<p>&#8220;These figures suggest that IT administrators may be overconfident in their ability to prevent data breach threats from zombie accounts,&#8221; Courion said, &#8220;which can cost organizations millions of dollars in damages and tarnish brand reputation.&#8221;</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:59:36 by W3 Total Cache --