fbpx
Insurica
Pay Now
Client Login

When employees leave a company, there is a heightened risk of data theft, which is also known as data leakage or exfiltration. This risk is present whether an employee’s departure is voluntary or not.

The consequences of data theft from insiders can be severe, as an organization’s most valued data assets and secrets are vulnerable. Data leakage events can impact a company’s financials through lost business and intellectual property, and they can result in reputational damage, litigation and regulatory fines.

Departing employees may have various motives for stealing sensitive corporate data, and it is crucial to be aware of and look for warning signs that an insider may engage in this impropriety.

Reasons Sensitive Data May Be Stolen

There are several reasons departing employees may take corporate data. While some may have malicious intent, other incidents may be the result of accidents or misunderstandings. The following are common reasons a departing employee may take corporate data:

  • To secure a new job or compete with a former employer—A company’s trade secrets or intellectual property can be valuable to a competitor. A departing employee may leverage this data to obtain a new job or gain an advantage in a new position by using it to compete with their former employer.
  • For personal financial gain—A former employee may be able to sell data they take, or they may be able to use it to jumpstart their own business venture.
  • To seek revenge—Departing employees may be disgruntled or frustrated about the circumstances of their transition. This may lead to malicious destruction of data to sabotage or disrupt their previous company’s operations.
  • On accident—Data exfiltration may not always be the result of malevolent actors. Departing employees may incorrectly believe the data was theirs, or they may accidentally retain it by failing to sufficiently wipe the devices they used for business purposes.

Data Theft Warning Signs

Companies can work to prevent data theft by proactively monitoring warning signs. Indicators that an employee may compromise sensitive information include actions such as:

  • Engaging in suspicious web-based activities, including utilizing incognito browsers, having several webmail accounts, researching how to bypass security and using personal file sharing platforms
  • Using unauthorized personal devices for business activities
  • Accessing business data at unconventional times or repeatedly downloading or transferring an inordinate amount of data
  • Requesting to gain access to information that is outside the scope of their job description
  • Recording or taking screenshots of company meetings
  • Acting out of character or in a way that is against company policies
  • Trying to trick or pressure coworkers into gaining access to their data

Prevention Tips

Organizations can implement the following strategies to reduce the risk of departing employee data theft:

  • Be proactive. Look for warning signs to stop data theft before it happens.
  • Establish clear policies and procedures. Policies should state the delineation between personal and business use of data, devices, networks and other technologies. They should also contain procedures on how this information will be disseminated to new, existing and departing employees.
  • Assign ownership of insider threat risks. Designate someone within the organization to be responsible for updating the data theft prevention program, conducting employee trainings and maintaining a data theft incident response plan.
  • Have a zero-trust mindset when employees leave. Assume a departing employee will retain some access to sensitive information after they leave. Utilize tools that create a full audit trail should an issue arise.
  • Acknowledge that no system will be completely effective in stopping all data theft. No matter how advanced, technological data loss prevention systems are not capable of preventing all instances of data exfiltration. Continually update your policies and regularly test your procedures.
  • Encourage cross-collaboration between business units (e.g., HR and IT). This can be particularly useful during offboarding to ensure equipment is returned in a timely matter and departing employee access to data is restricted when necessary.

Data theft from departing employees presents a significant exposure, and companies must be aware of warnings signs and techniques to mitigate its associated risks. For more risk management guidance, contact us today.

This is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. © 2023 Zywave, Inc. All rights reserved.

About the Author

INSURICA
INSURICA

Share This Story

Stay Updated

Subscribe to the INSURICA blog and receive the latest news direct to your inbox.

Subscribe to the blog

Related Blogs

Report Finds Weight Loss Drugs Key Driver of 2025 Health Care Cost Increase

September 3rd, 2024|Blog, Employee Benefits|

A recent Business Group on Health (BGH) survey found that heightened interest and spending on glucagon-like peptide-1(GLP-1) drugs is a major driver of rising health care costs in 2025.

Insurance Challenges Facing Coastal Commercial Properties

September 2nd, 2024|Blog, Risk Management, Safety Tips|

Coastal environments refer to areas located on or within a few miles of shorelines. These environments are some of the most popular spaces for commercial real estate in the United States, primarily due to their economic benefits.

5 Risks of Hiring an Uninsured Contractor

September 1st, 2024|Blog, Construction, Trending|

Project owners or general contractors must carefully vet contractors to ensure job site safety and financial security. A critical factor in this selection process is verifying that contractors carry adequate insurance. Hiring uninsured contractors can expose a project to significant risks, including safety hazards, liability issues and potential financial losses.

Go to Top