SHARE
Facebook X Pinterest WhatsApp

Ex Employees Pose Growing Security Threat

Ex Employees Pose Growing Security Threat Reprisals from recently departed employees and a lack of adequate security budgets and resources are becoming major concerns for senior IT professionals, according to the 12th annual Ernst & Young Global Information Security Survey. By Steve Wexler 75% of respondents fear reprisals According to nearly 1,900 senior executives in […]

Written By
thumbnail Steve Wexler
Steve Wexler
Nov 11, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Ex Employees Pose Growing Security Threat

Reprisals from recently departed employees and a lack of adequate security budgets and resources are becoming major concerns for senior IT professionals, according to the 12th annual Ernst & Young Global Information Security Survey.

By Steve Wexler

275% of respondents fear reprisals

According to nearly 1,900 senior executives in more than 60 countries, 75% are concerned with the possible reprisal from employees who have left their organizations.

42% are trying to understand the potential risks related to this issue and 26% are already taking steps to mitigate them.

3Companies must do risk assessment

"Increasingly, the employer’s IT system has become a common target and data theft is also prevalent," says Paul van Kessel, Global Leader of Ernst & Young’s Information Technology Risk and Assurance Services practice.

4Budget challenges

Despite 50% of respondents ranking this as a high or significant challenge, up 17% from 2008, less than half (40%) plan to increase their annual investment in information security as a percentage of total expenditures, while 52% plan to maintain the same level of spending.

5Security requires more investment

Information security today already requires a lot more investment, as organizations race to catch up with an accelerating threat landscape, after a much delayed start. However, information security is not immune to external economic forces and senior IT professionals will need to improve efficiency and effectiveness while keeping spending to a minimum."

6Regulatory compliance a top priority

Regulatory compliance is also a top priority and continues to be an important driver of information security improvements.

55% of respondents indicate that regulatory compliance costs account for moderate to significant increases in their overall information security costs. Only five percent plan on spending less over the next 12 months on regulatory compliance.

7Changing security landscape

Government and industry-led regulations have resulted in organizations adopting a more-structured approach to information security. Becoming compliant is changing organizations’ security procedures and policies for the better.

8Comprehensive security

Companies must shift their focus from exercising ‘point in time’ security activities to incorporating information security into a comprehensive, enterprise-wide governance, risk and compliance program where managing and automating these efforts on a cost-effective basis can help drive overall business performance improvement."

9Leveraging technology

Implementing or improving Data Leakage Prevention (DLP) technologies -the combination of tools and processes for identifying, monitoring and protecting sensitive data or information -is the second-highest security priority in the coming 12 months. Forty percent of respondents rank this as one of their top three priorities.

10Laptop encryption lagging

Only 41% currently encrypt them, with 17% planning to do so in the next year. This is surprising given the number of breaches that have occurred due to loss or theft of laptops, that encryption technology is readily available and affordable and that the impact to users during deployment is relatively low.

11Holistic approach

Organizations are abandoning old paradigms by taking a holistic approach that integrates information security within the business. It is a more flexible, risk-based approach focused on protecting the organization’s critical information. It is also better suited to the connected business model needed to support today’s increasingly mobile and global workforce.

Recommended for you...

Exterro Debuts Agentic AI Tools for Data Risk and E-Discovery 
Jordan Smith
Aug 26, 2025
SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.