HomeUpdateWhat was the greatest threat faced by the IT department during...

What was the greatest threat faced by the IT department during the great resignation?

-

Last Updated on 05/03/2022 by Nidhi Khandelwal

In the middle of ‘The Great Resignation,’ the damage caused by workers (or contractors) departing a business could be one of the most significant threats facing IT departments today. User onboarding and offboarding are an everyday occurrence in today’s dynamic workplace computer environment.

What was the greatest threat faced by the IT department during the great resignation? 1

It’s easy to lose track of who’s coming and going when staff counts reach the five-figure range — and entire networks of contractors must be accounted for as well. Offboarding processes are frequently overlooked – simply disconnecting or deleting the user from Active Directory or IAM is insufficient because the user may have local credentials on some SaaS platforms or other sensitive systems.

Technically, offboarding can be automated utilizing protocols like SCIM and JIT mapping; however, this requires a high level of maturity in an IT system as well as the personnel to implement it.

Offboarded personnel may still have local credentials on some of their routinely used SaaS platforms or other sensitive systems in firms that do not use SCIM or JIT. Allowing these users to have their access opens the door to unauthorized data access.

When it comes to deprovisioning (removing outdated users from systems), there are a few best practices to keep in mind and follow.

What was the greatest threat faced by the IT department during the great resignation? 2

Maintain an Inventory – It’s critical that IT teams have an up-to-date list of all users with access to firm systems at all times. It is necessary to create a line of contact with human resources in order to stay informed about events that affect the user inventory, such as employee terminations. These systems must be capable of analyzing both internal and external users in order to be effective from a security standpoint. The vendor landscape might be ever-changing.

Nidhi Khandelwal
Nidhi Khandelwal
Nidhi is a tech news/research contributor at TheDigitalHacker. She publishes about techno geopolitics, privacy, and data breach.
- Advertisment -

Must Read

edge-ai

Challenges and Opportunities in Deploying AI Solutions in Edge Computing Environments

0
Edge AI is a ground-breaking new paradigm that has the potential to completely change how companies run. Organizations can seize new chances for creativity,...