Small-biz tip: Don't overlook this digital danger

Are you the type of business owner who forgets about ex-employees as soon as they’re gone? Failing to remove former employees’ access to your systems and data could lead to security breaches. Don’t let poor offboarding practices be the weak link in your cybersecurity chain.

How improper offboarding can hurt your business

Whenever an employee leaves the organization, you must remove their access to company systems and data. That’s especially true if you’ve laid off an employee. They may feel a sense of anger or resentment towards the company, which makes them more likely to be malicious.

It’s more common than you might think. A recent study from Beyond Identity examined how ineffective offboarding impacts a business’ cybersecurity. They found that one in three employers has been hacked due to ineffective offboarding.

Oh, and most former employees say they can still access company files. Researchers say 91% of employees can still see private files after offboarding earlier last year. Do you want former employees to know what you’re doing a year later? Probably not!

Plus, the study found only 21% of employers deactivated an employee’s account immediately after they let the worker go. It took 29% a whole week to cut the strings.

Offboarding is the process of removing an employee's access to company resources after they leave. Do it correctly to remove security risks.
Image from Beyond Identity.

Overall, businesses estimated they lost $7,687 to ineffective offboarding. In other words, it’s a mistake you can’t afford to make. Want to build better business practices? Here are the three lessons Kim has for fellow business owners.

Offboarding dangers for small-business owners

⚠️ If you don’t completely cut off former employees, you’re taking on a ton of risks, like:

  1. Insider threats: Former employees who can still access company systems and data can steal confidential information or sabotage your systems.
  2. Social engineering: I talk a lot about how dangerous phishing scams are. They can level a company’s computer systems. Former employees are especially dangerous because they know social details about the workplace, which can help them access sensitive information or networks.
  3. Revenge: In some cases, fired employees may attempt to cause harm to their former employer out of revenge, such as launching a denial-of-service attack or spreading false information about the company.

Beyond Identity’s survey found that 86% of employees have considered taking negative actions against a former employer. People who actually went through with retaliation had diverse reasons: 37% said they didn’t get a raise, while 29% cited a bad relationship.

Continue reading

Holiday tech hacks: Digital cookbook, easier cards, group pic tips

I’m not sure where this year went, but it’s time to dive headfirst into the festive frenzy. I’ve got some tech tips up my sleeve that’ll sprinkle a little magic on your celebrations. You’re gonna love ‘em!

If your recipes are printed or handwritten, snap a pic with your phone or tablet. Add them all to one folder (or try the Notes app on iOS or Google Keep for Android) for easy swiping. Listen here for more tips about that.

Continue reading

Stop texting for their travel ETA

Have someone flying in to visit this summer? No more tracking them online or trying to figure out if they’ve been delayed if you use this hack.

🖨️ Clever printer hack: Dust can cause unexpected problems with your printer. Open the paper trays, remove any paper and use a handheld vac to suck up the dust. You can also blow it out with compressed air (43% off).

We may receive a commission when you buy through our links, but our reporting and recommendations are always independent and objective.

How to get cheap flights with expert Clark Howard

Open/download audio

Money-saving guru Clark Howard is here, sharing his top-secret strategies to land the cheapest flights imaginable — and trust me, the airlines do not want you knowing these tricks. We talk about clever booking hacks, algorithms, hidden deals, and the perfect time to strike.

📦 If you see this trick online, it doesn’t work anymore: A Walmart shopper found the ultimate moving-day hack: Ordering 24 boxes online. Each box arrived individually packed in a Walmart delivery box with bubble wrap, basically doubling his single-box order for free. Someone at Walmart caught on, of course, and now they’ll be shipping box orders altogether.

6 ways tech can solve life's little annoyances

Minor tech annoyances can seem small at the moment. But in the grand scheme of things, they can cause stress and wasted time. If you don’t want tech issues to have a significant impact, cut them off with these tech life hacks.

Continue reading

After my Volvo broke, I was Saab-ing: Cybercriminals leaked 240GB of Toyota customer info on a hacking forum. The stolen data includes emails, passwords, contracts and financial details. Toyota says they’ve reached out to those impacted. No word on how many folks that is.

ADT hides a major cyber hack

Open/download audio

How secure is your home or business? ADT just revealed a data breach but is keeping quiet about the timing and details of what was stolen. Plus, the risks of storing cash in Cash App, AI classes for seniors, and a crucial Amazon Echo security setting you should check.

He fell for an online Ponzi scheme

Open/download audio

YouTuber Antenna Man is opening up about being a victim of the Agridime Ponzi scheme. He hopes others don’t fall into the same trap. Plus, a woman tracks down a thief with an AirTag, and someone hacks a guy’s Bluetooth headphones — creepy stuff!

Pass me a cold one: Relay hacks and keyless jamming are ways someone can take over your car’s key fob. Paid solution: Buy a signal-blocking case, like this shielded RFID-blocking pouch. Free solution: Store your key fob in the refrigerator or freezer; the multiple layers of metal block the signal.

We may receive a commission when you buy through our links, but our reporting and recommendations are always independent and objective.

Toxic chemicals found in Temu products

Open/download audio

Officials flagged sandals with 11 times the legal lead limit! Google’s forcing your site to train its AI if you want it searchable. Plus, the FTC is cracking down on fake reviews, and a hack to find cheap flights online.

🚴‍♂️ Not wheelie good: Researchers found a way to hack bicycle wireless gear shifters with just a few hundred bucks of tech and a laptop. The trick works on Shimano Di2 shifters, which are used by top cycling teams worldwide. A patch is rolling out in late August.

ADT hides a major cyber hack

Open/download audio

The home surveillance company revealed a data breach but is hiding the details. I’ll tell you why this should make you rethink who’s protecting your home.

💩 Shame for fame: A Brazilian model is going viral for an antiaging “hack” — spreading her own poop on her face. I’m not linking the video, because trust me — you don’t want to see it. This crap (sorry) is so popular on social, experts are stepping up to warn against the dangers of exposing yourself to bacteria and parasites. Just … don’t.

🎵 Work hack? Studies show surgeons work faster and more accurately when listening to classical music. For those of us not in the operating room, the best tunes are those that put you in a better mood. The three most popular tracks on work-related Spotify lists: “Drops of Jupiter” (Train), “Dreams” (Fleetwood Mac) and “Don’t Stop Believin’” (Journey). Did I just hear you humming a tune?

Laptop catches fire on plane

Open/download audio

It started smoking inside a passenger’s bag. Plus, the RiteAid hack, and AT&T data breach. We also talk to Elliston Berry and Anna McAdams, a mother-daughter team fighting deepfake revenge porn.

Is 'oatzempic' a weight-loss miracle?

Open/download audio

TikTok claims an oatmeal and lime smoothie can help you lose 20 pounds a month. Plus, there’s a major Roku hack, you can’t be anonymous on OpenTable and be careful what you click on X.

Parenting hack: Ever tried calming a baby in the car? A California dad took a close-up photo of Mom’s face, turned it into a large cutout and slapped it on the back seat. Now, the little one giggles at her favorite person from the backseat. Adorable video here.

Change Healthcare hackers stole your data. What should you do?

Open/download audio

The Change Healthcare hack in February was entirely avoidable; the company neglected basic software updates. So, what does this hack mean for you? Spoiler: a lot.