You may not realize it yet, but we’re living through the latest zeitgeist. It’s the Great Resignation. You may have heard it being tossed around the media or witnessed it firsthand, or even been a part yourself. Either way, it’s happening across the United States. And it affects data security as much as it affects the employment rate.

Waves of employees are quitting their jobs as more people get the COVID-19 vaccine in the United States. Others consider changing their jobs in the future. In fact, 4 million people quit their jobs in April 2021 alone.

What Is the Great Resignation?

The Great Resignation appears to be caused by the COVID-19 pandemic. As we know, the pandemic brought on a major shift to remote work. This led to a blending of work and personal life. The change was jarring for many, but eye-opening for others. Employees have spoken out about the benefits of remote work. Those can range from child and pet care to saving money on their commute to increased happiness. The stay-at-home orders left people with a lot of time to reflect on their job satisfaction and personal goals. Overall, people are putting their personal lives before work.

As vaccines reduced the spread of the virus, companies began discussing and proposing a return to the office. This further catalyzed the wave of departures as employees did not want to return or simply were taking advantage of the hot hiring market and many job openings.

What Does This Mean for Data Security?

Now that people are leaving their jobs in waves, let’s address something that may not come to mind right away  — the data security risk this trend poses.

How do we safely offboard an employee?

Identity and Access

One area to consider relates to identity and access management, specifically, identity governance and administration. Waves of employees leaving at once can overwhelm IT and security teams. Each of those people needs to be offboarded. That entails taking inventory on all the systems an employee has access to. Then, before the employee’s departure, teams need to wipe the employee’s digital presence and end access to a myriad of things. Those can include intellectual property, sensitive company data, tools, apps and even consumer personal information. The worst possible outcome would be if an employee’s access slips through the cracks. After all, that can evolve into an insider threat or full-on breach.

One area of concern is privileged access management. Consider a departing employee who has special access to the crown jewels. Maybe they are an IT director or even a chief information security officer (CISO). These employees pose as an even greater risk and require a thorough offboarding.

Endpoint Data Security

Consider the hardware. Company-owned endpoints must be returned and access to company applications on personal devices needs to be shut down. This takes more work than you might think (think shipping, deadlines and arranging returns).

Data Migration

What about all the critical data relevant to specific employees? Employees who are integral to certain business processes may host data in cloud and software-as-a-service environments. That employee might move on, but the company doesn’t want to lose access to important accounts. So, they must migrate data from that user’s account to another company platform. This is a complex process, so often times companies just continue paying for that user’s account. Multiplied by tens or hundreds of employees, that can add up.

What’s the Point?

Cybersecurity concerns, like those that come with employees leaving a job, exist all around us. Security needs to be considered in almost every business, institution or government action. Leaders need to stop and take a moment to ask, “What data security concerns does this pose?” It’s always better to be safe than sorry.

Special thanks to Marc von Mandel for contributing IAM expertise to this article.

More from Data Protection

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

Third-party access: The overlooked risk to your data protection plan

3 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today