Risk #3: “Ghosts” in the machines

Did You Know? Inactive users or inactive computers are a threat.

There may be “ghosts” haunting your networks – inactive users or inactive computers that remain part of your system, even if they are no longer contributing to your productivity.

While the threat may not be immediately obvious, defunct computers represent an expense you don’t need to carry. Worse, inactive users may reflect open accounts (perhaps of people who are no longer employed by your business) that could present security holes for unauthorized access. Run audits that show you what’s active or not, then clean house – and close security loopholes – by burying the “dead” devices and accounts. https://www.trianglecompudocs.com/services

3 views0 comments

Recent Posts

See All