A striking number of companies do not deactivate a former employee’s passwords after the worker is no longer on the job, a new study by Password Manager found.
47% Use Employer's Passwords
In a study of 1,000 U.S. employees, 47% admitted to using their past employer’s passwords after leaving the company to access email, software, tools and the like, according to the study’s findings. More than one in four are currently using passwords to access paid subscriptions and only one in seven have been caught using the former company’s password credentials.
Along those lines, some 10% said they have used a past employer’s passwords to disrupt company activities.
A Closer Look at the Survey
Here are more data from the survey:
On accessing former employees accounts with previous passwords...
Said Daniel Farber Huang, who heads privacy and cybersecurity at Password Manager:
“First and foremost, companies should make it 100 percent clear to their employees what the standards of care and conduct are, including what is authorized and unauthorized handling of intellectual property and proprietary information."
On former employees guessing their ex-employer’s passwords...
Huang commented:
“Cost factor is certainly one meaningful issue for most companies lacking proper security. The other aspect is having a staff person to manage the on-going process.”
On getting caught using a former employer’s password...
Huang explained:
“Beyond technical solutions or safeguards, the first line of defense is managing the human element, knowing an account password is not necessarily a problem, but making the conscious decision to use it for personal gain is a problem.”
On what former employees used passwords for...
Commented Huang:
“From a technical standpoint, it’s important for companies to understand what assets they have, which includes services, information, and other types of accounts used by the company – whether by just a few employees or everyone – and classify or prioritize, starting with being highly valuable or critical and working down the list to what’s not as important to protect.”
On disrupting company activities:
Huang said:
“Even if no legal action is ultimately taken, nobody wants to be threatened by a corporation – it’s just not worth the hassle and frustration. And I’m describing a non-malicious violation here. If someone were actually trying to inflict damage or loss on a former company, that’s a whole other scenario that can get ugly and litigious fast, and rightfully so."
On employers’ password security:
Huang explained:
“Companies are responsible for the integrity of their operations and the safety and well-being of their people. Presumably if a company is handling both sides well, one would hope there would be less likelihood of creating situations where a former employee would seek to inflict intentional damage.”