The Unpaid Summer Intern that Could Cost You Millions

Abandoned Accounts for Seasonal Workers Create Access Risk that May Lead to a Data Breach; Assess Your Access Risk with a Complimentary Quick Scan from Courion

WESTBOROUGH, Mass.--()--Courion®, the market leader in intelligent identity and access management (IAM), recommends now that Labor Day has come and gone, companies take a close look at a common access risk factor that may be leaving them vulnerable to a data breach: abandoned accounts.

Most organizations hire seasonal workers, especially in the summer months when university students are available and interested in employment, often at low or no cost to an employer. These temporary employees are given access to company resources, and may even be using privileged access credentials shared by a manager. Many companies forget or neglect to terminate accounts used by temporary employees and interns when summer ends. What’s more, as a company grows and other employees are transferred or terminated, or temporary workers or contractors leave the organization, the number of abandoned accounts can grow – significantly.

Abandoned accounts are not revealed during the typical periodic audit that an IT department might conduct, so these accounts often go unnoticed. The problem is abandoned accounts provide hackers with an easy way to gain access to your network. In addition, seasonal employees are not tied professionally or emotionally to your organization and may be more prone to explore your network and exploit access vulnerabilities, even at a later date.

Reducing or eliminating access risks such as abandoned accounts makes sense as a way to minimize the possibility of a data breach, but CISOs need an efficient way to uncover them. To assist with this problem, Courion now offers a complimentary quick scan evaluation of access risk which leverages the award-winning identity and access intelligence solution, Access Insight, to help organizations gauge whether they have an abandoned account problem. Based on evaluations of access risk recently conducted by Courion at more than twenty major corporations, organizations often have not just a few, but thousands of abandoned accounts.

Both the 2014 Verizon Data Breach Incident Report and the SANS Institutes Top 20 Critical Security Controls recommend that CISOs know who has access to their data and review user accounts on a regular basis. That’s why Courion’s intelligence-driven approach to IAM provides an organization with the ability to “assess first” and uncover issues such as abandoned accounts and orphan accounts with no oversight, or accounts with more access than is truly needed.

“Once hidden access risk factors are eliminated, an organization can continue to leverage the intelligence integrated within the Access Assurance Suite in provisioning and governance operations,” emphasized Chris Zannetos, CEO of Courion. “An organization can not only start, but also stay compliant, because continuous monitoring is built into the suite that automatically detects, notifies and enables remediation of policy violations as they occur, further minimizing access risk and streamlining future audits.”

Courion is a leader in the Gartner Magic Quadrant for Identity Governance and Administration (IGA) and a leader in the KuppingerCole Leadership Compass for Identity Provisioning. To learn how you can use intelligent identity and access management in your organization, contact 866.Courion or info@courion.com.

About Courion

Courion is the market leader in Identity and Access Management (IAM), from provisioning to governance to Identity and Access Intelligence (IAI). Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide open and compliant access to thousands of employees while protecting critical company data and assets from unauthorized access. Courion has offices and operations in the USA, Europe, Middle East and Asia. To learn more about how you can add intelligent identity and access management solutions to your security controls, contact 866.Courion or info@courion.com.

For more information about Courion, please visit:

Website: www.courion.com

Twitter: twitter.com/courion

LinkedIn: linkedin.com/Courion-Corporation

Blog: http://blog.courion.com/

Courion is a registered trademark of Courion Corporation. All rights reserved. All other company and product names may be trademarks of their respective owners.

Contacts

Courion Corporation
Martha Collins, 617.905.8551
mcollins@courion.com
or
Brodeur Partners
Michelle Dillon, 603.559.5835
mdillon@brodeur.com

Release Summary

Courion recommends now that Labor Day has come and gone, companies take a close look at a common access risk factor that may be leaving them vulnerable to a data breach: abandoned accounts.

Contacts

Courion Corporation
Martha Collins, 617.905.8551
mcollins@courion.com
or
Brodeur Partners
Michelle Dillon, 603.559.5835
mdillon@brodeur.com