Small-biz tip: Don't overlook this digital danger

Are you the type of business owner who forgets about ex-employees as soon as they’re gone? Failing to remove former employees’ access to your systems and data could lead to security breaches. Don’t let poor offboarding practices be the weak link in your cybersecurity chain.

How improper offboarding can hurt your business

Whenever an employee leaves the organization, you must remove their access to company systems and data. That’s especially true if you’ve laid off an employee. They may feel a sense of anger or resentment towards the company, which makes them more likely to be malicious.

It’s more common than you might think. A recent study from Beyond Identity examined how ineffective offboarding impacts a business’ cybersecurity. They found that one in three employers has been hacked due to ineffective offboarding.

Oh, and most former employees say they can still access company files. Researchers say 91% of employees can still see private files after offboarding earlier last year. Do you want former employees to know what you’re doing a year later? Probably not!

Plus, the study found only 21% of employers deactivated an employee’s account immediately after they let the worker go. It took 29% a whole week to cut the strings.

Offboarding is the process of removing an employee's access to company resources after they leave. Do it correctly to remove security risks.
Image from Beyond Identity.

Overall, businesses estimated they lost $7,687 to ineffective offboarding. In other words, it’s a mistake you can’t afford to make. Want to build better business practices? Here are the three lessons Kim has for fellow business owners.

Offboarding dangers for small-business owners

⚠️ If you don’t completely cut off former employees, you’re taking on a ton of risks, like:

  1. Insider threats: Former employees who can still access company systems and data can steal confidential information or sabotage your systems.
  2. Social engineering: I talk a lot about how dangerous phishing scams are. They can level a company’s computer systems. Former employees are especially dangerous because they know social details about the workplace, which can help them access sensitive information or networks.
  3. Revenge: In some cases, fired employees may attempt to cause harm to their former employer out of revenge, such as launching a denial-of-service attack or spreading false information about the company.

Beyond Identity’s survey found that 86% of employees have considered taking negative actions against a former employer. People who actually went through with retaliation had diverse reasons: 37% said they didn’t get a raise, while 29% cited a bad relationship.

Continue reading

Locked out of your Google account? Here's how to get back in

If you find yourself locked out of your Facebook account, don’t panic. Take solace in the fact that your strong password will also make it difficult for cybercriminals to get access. You shouldn’t trust a stranger who promises to help you get back into your accounts. Tap or click here to see why.

Continue reading

Global tech outage wreaks havoc

Open/download audio

A software update by CrowdStrike took down tons of computer systems around the world. Banks, businesses, hospitals, and more were all impacted. Plus, Amazon Prime Day updates and Zoom’s demand for a return to the office.

📻 AM comeback: A new bill could require all car manufacturers to install AM radios. This is one of the best, most reliable ways to reach people during emergencies when other systems like mobile networks can fail. I also appreciate all you “hams” in the crowd. It’s such a contact sport.

$2.2 billion

How much movie theater chains are spending to lure us back. It’s not just better screens (though there are plans for 21,000 of those), beefed-up sound systems and comfier seats. You may see pickleball courts, arcades, ziplines and bowling alleys at a theater near you … all of which will be grossly overpriced.

Chinese hacking contest reveals weaknesses in iPhones, Windows and other tech we use every day

Operating systems and software are put through thorough testing before public release. That doesn’t mean flaws don’t fall through the cracks. Hackers can exploit some of those flaws, forcing the developer to issue a quick update to patch them. Tap or click here for signs your device has been hacked.

Continue reading

America's drinking water is under attack

Open/download audio

Water systems in Kansas, Texas and Pennsylvania have already been hit by hackers in China, Russia and Iran. Plus, clothes that block 5G waves, AI coming to Alexa, and Walmart’s new digital pricing. We also chat with Joseph Cox about his book “Dark Wire,” which is about Anom, the FBI’s secret app used by criminals.

AI theft - let the lawsuits begin

Open/download audio

The music industry says AI systems like ChatGPT are using their copyrighted material without asking. Now, they’re taking it to court.

🏎️ Ferrari’s future won’t include GPS: But it will include a $500,000 EV. The luxury automaker is ditching built-in nav systems because, uh, our phones are way better. And start saving now; its half-a-million-dollar electric model is launching next year.

Criminals using Wi-Fi jammers: Police caught an international crime ring staking out marks’ homes. Once the victims left, they used Wi-Fi jammers to disable the house’s Wi-Fi and security systems to rob them. A Chilean gang tried to do the same thing to me, and the Phoenix SWAT team even stormed my house! Worth the watch, promise.

Let the gun times roll: Google’s former CEO, Eric Schmidt, says AI systems eventually will be so smart that we’ll have to guard them with “machine guns on military bases” to keep them out of enemy hands. How far in the future does he think this will happen? About five years. Cool … cool, cool, cool.

Solar storm tech issues: There weren’t too many disruptions from the recent global light show, but Starlink’s satellites had a few glitches. Interestingly, GPS navigation systems used by John Deere tractors and other brands to create ultra-tight, straight lines for planting were knocked out — and during a peak planting season. I was so bummed I saw nothing in the skies over Phoenix.

Our hospitals are under attack

Open/download audio

This week’s cyberattack on one of the largest health systems in the U.S., Ascension, was bad — really bad. Plus, a controversial Apple iPad ad, more Cybertruck problems, and Roblox adds virtual billboards to the game.

Tanks a lot: A Florida man is spending six-and-a-half years in prison after making $100 million selling phony Cisco gear for classified systems used by the U.S. Air Force, Army and Navy. Most of these devices were sold on Amazon and eBay. Yup, our military bought fake gear on eBay. 

White font secret to beating AI

Open/download audio

Want to increase your chances of getting noticed by AI systems during job applications? Here’s why a little white font goes a long way, in 60 seconds.