MegaBanner-Right

MegaBanner-Left

LeaderBoad-Right

LeaderBoard-Left

Home » Industry News » The rise of the “shadow employee”: When ex-employees still have access

The rise of the “shadow employee”: When ex-employees still have access

Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply overlooked during offboarding. Months later, the ex-employee accidentally drags a folder from that shared drive onto a public-facing personal cloud storage, thinking it was their own. The link to this inadvertently exposed data is then discovered by a competitor or a data broker, leading to a massive leak of proprietary information, significant reputational damage, and a loss of client trust. This seemingly innocuous oversight, can spiral into a devastating corporate crisis. While this scenario is a little extreme, it is unfortunately not far-fetched in today’s complex digital landscape.

When an employee leaves an organisation, most leaders focus on succession, handovers and HR paperwork. But behind the scenes, another risk often goes unchecked: the “shadow employee”. Retaining access to company systems long after they’ve left, these ex-staff members pose a serious cybersecurity threat that can lead to data breaches, financial loss and reputational damage – even if everyone parted ways with smiles, hugs and pizza.

According to a recent study, 89% of former employees keep valid logins, while 45% retain access to confidential data after departure. Most disturbingly, almost half admitted to continuing to access company systems after leaving. 

“The shadow employee phenomenon is more common than many realise, particularly in organisations with high staff turnover or fragmented and cloud-based systems,” asserts Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa.

She says it often goes undetected because access management tends to focus more on onboarding than offboarding. “When IT and HR operate in silos or access isn’t centrally tracked, it’s easy for credentials, third-party accounts or shadow IT tools to be overlooked,” Collard comments. “It shouldn’t be seen as just a technical issue; it’s a human one, too, where attention to digital hygiene and processes are lacking.”

Risks of rogue access

The threat of shadow employees was brought into sharp focus in 2023 when a US company suffered a major data leak traced back to a former IT consultant whose access to internal drives was never revoked. The incident exposed client information and resulted in a six-figure (dollar denominated, no less) settlement on top of contract losses.

“The risks are serious and multifaceted,” states Collard. “They encompass operational risk, reputational risk and financial risk.” In terms of operational risks, she explains that outdated access rights can disrupt workflows, expose sensitive information or allow unauthorised changes to systems – even inadvertently.

Regarding reputational risk, a data breach caused by a former staff member can erode customer trust and damage brand credibility. “Ex-employees with active credentials can intentionally or unintentionally cause data breaches, leak sensitive information, manipulate internal systems or impersonate staff,” she says.

“In some cases, disgruntled employees may delete or sabotage critical data,” she elaborates. “Even if there’s no malicious intent, the mere presence of active credentials outside of an organisation’s control creates vulnerabilities that threat actors can exploit, especially through credential stuffing or phishing.”

The last risk to organisations involves financial risk. “Rogue access can result in regulatory fines, legal costs and lost revenue,” she says. The reason why this security breaches occur is that many organisations treat offboarding as an almost “optional HR thing”, not a cybersecurity event. “They fail to conduct thorough access audits or delay revoking credentials across all systems, especially cloud platforms, collaboration tools and unmanaged software-as-a-service (SaaS) applications,” argues Collard. 

Why robust offboarding is key

To close the loop and reduce the shadow employee threat, organisations must build strong offboarding processes that bridge HR and cybersecurity. “It starts with a shared mindset: offboarding must be seen as a collaborative security process, not just an admin task,” she comments.

Another important step is to automate deprovisioning to revoke access in real-time. “Integrating identity and access management (IAM) tools and involving security or risk teams in offboarding governance can also help,” she says. Other action items include performing regular access reviews to identify dormant or unauthorised accounts and educating managers to close the gap on shadow IT. 

“Make line managers accountable for flagging all tools and systems used by exiting staff and track unofficial tools in your access control system,” she recommends. The HRM Report also noted that “Shadow AI” use is a growing concern across Africa, with 46% of organisations still developing formal AI policies while staff increasingly use generative AI from work networks without checks on credentials or information sharing. This lack of governance around new technologies further underscores the need for robust offboarding processes that account for all forms of access, not just traditional systems.

In conclusion, Collard maintains that former employees shouldn’t keep the digital keys to your organisation’s kingdom. “As the workplace becomes more hybrid and decentralised, organisations must rethink offboarding as a critical component of cybersecurity hygiene,” she emphasises.

 

To enquire about Cape Business News' digital marketing options please contact sales@cbn.co.za

Related articles

As kidnapping tactics evolve, SA CEOs turn to private security for executive protection

Phangela Group reports surge in demand for tactical escorts and high-level security intelligence as traditional measures fall short Tactical escorts in unmarked vehicles. Executive abductions...

Mixed bag for motorists as petrol drops but diesel spikes sharply

South African motorists are in for a mixed adjustment at the pumps this month, as the Department of Mineral Resources and Energy (DMRE) announces...

MUST READ

FUCHS LUBRICANTS SOUTH AFRICA Introduces Enhanced Distribution Strategy in the Western...

FUCHS LUBRICANTS SOUTH AFRICA is excited to announce a significant transformation in its distribution strategy within the Western Cape. This strategic shift marks a...

RECOMMENDED

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.