, , , , , ,

The Business World’s Riskiest User Will Surprise You

And your customers need to know. Educate them on how to combat risky user security practices and manage access to IT services during employment – and after employment ends.

In our 2015 Insider Risk Report, Intermedia surveyed over 2,000 knowledge workers in the US and UK about their security practices at current and previous places of employment.  And incredibly, 93% of respondents admitted to engaging in at least one form of risky data security – from sharing account credentials to installing non-sanctioned applications.

Risky users present a reoccurring problem to businesses. Teach your customers how prevent this kind of behavior by implementing a set of guidelines incorporating best practices for employee security and access to IT services during employment, as well as a rigorous IT off-boarding process for departing employees.

We have put together a downloadable kit that includes:

  • A template to help you extend these best practices;
  • Guidelines for setting up internal processes;
  • Specific actions to take when onboarding and off-boarding employees.

In addition, this kit includes recommendations specific to regulated industries such as financial services, legal services and healthcare.

Check it out today in the General section of the Partner Sales Portal and drive demand by being an expert to your customers.

About Sharon Svensson

Sharon Svensson is Director of Marketing for Intermedia's Security Products Division.