That’s where people gradually build up more access than they really need, often because they move roles, get added to new systems, or no one takes a close look at what they can see.
The research shows that only a tiny percentage of businesses are actively managing this properly. And that means huge amounts of data are being left exposed.
Even scarier, nearly half of businesses admit that some of their ex-staff still have access to systems months after leaving. That’s like leaving the keys to your office in the hands of someone who no longer works for you.
The solution is to make sure your people can only access what they need, and nothing more. This is often called “least privilege”.
It means setting up systems so that permissions are limited to what’s necessary. And access is only given temporarily when required. That’s sometimes referred to as “just in time” access.
And just as important, when someone leaves your business, all their access should be removed straight away.
Today’s world of cloud apps, AI tools, and “invisible IT” (where software is used without IT even knowing about it) makes this trickier. But it’s not impossible. It just means being proactive.
Regularly reviewing who has access to what, tightening permissions, and using tools that help automate this can make a huge difference.
The aim isn’t to slow people down. It’s to protect your data, your customers, and your business’s reputation.
If you need help checking how secure your access controls are, get in touch. It’s better to know now than after a breach.