Prevent Theft: Control Access to Confidential Data

Written by Rajat Bhargava on November 11, 2015

Share This Article

Endpoint devices are disposable. That’s what conventional wisdom in IT these days will tell you. Most organizations have moved to the cloud or are moving to the cloud, so there is little value in the endpoint. There are fewer and fewer servers in an office with data centers being outsourced to Infrastructure-as-a-Service providers, such as AWS or Google Compute Engine. Data lives in the cloud and on servers, but not on endpoints. At least, that’s what many organizations tell themselves.

Risky Business: When the Confidential isn’t Confidential

Intermedia did a study last year that found that 45% of employees retained “confidential” or “highly confidential” data from a previous employer. Perhaps this data included a customer list, product plans, roadmaps, or other valuable information. The what of the data isn’t the point. The fact that former employees had the information after their departure is an unnecessary risk to your company. Because virtually all of a company’s IP is stored digitally somewhere, confidential data could end up in competitor hands or, even worse, in the hands of another nation-state looking to replicate the success of companies in the United States and elsewhere.

That statistic and its repercussions should scare any executive team. Think about it: Nearly half of your previous employees have and could use confidential information from your organization. Of course legal contracts protect them from using that information and you could sue your competitors if they used the material, but you can avoid both altogether. There is a solution that solves the issues at the root of the problem rather than dealing with the expensive symptom. Up until now, the root of the problem has been difficult, if not impossible, to solve. With multiple platforms within a company’s infrastructure and no centralized tools, controlling user access to confidential data used to be a very difficult task.

Smart Business: When Data Theft is 100% Avoidable

While there are scenarios that you can never really predict or be fully protected from, there are simple things that you can do to control access to your company’s confidential data. When an employee leaves, terminate their accounts on all of the applications and systems they used. And, as a next step, remotely wipe their machines. There’s no reason to take a chance that they still can access confidential information or that the data on their machine could be off-loaded. Although most IT admins would like this level of control, few of them have it. But there is a solution to this challenge, one that any IT organization can use.

A cross-platform, SaaS-based Directory-as-a-Service platform gives IT admins the ability to lock down user access on machines, as well as remotely wipe them clean. With a couple of button pushes, IT can easily control the risk of a departing employee. If you would like to learn more about how Directory-as-a-Service can help you control confidential data, drop us a note. Or try Directory-as-a-Service for free.

Continue Learning with our Newsletter