Saturday, November 15, 2025
  • Who’sWho Africa AWARDS
  • About TimeAfrica Magazine
  • Contact Us
Time Africa Magazine
  • Home
  • Magazine
  • WHO’SWHO AWARDS
  • News
  • World News
    • US
    • UAE
    • Europe
    • UK
    • Israel-Hamas
    • Russia-Ukraine
  • Politics
  • Crime
  • Lifestyle
  • Sports
  • Column
  • Interviews
  • Special Report
No Result
View All Result
Time Africa Magazine
  • Home
  • Magazine
  • WHO’SWHO AWARDS
  • News
  • World News
    • US
    • UAE
    • Europe
    • UK
    • Israel-Hamas
    • Russia-Ukraine
  • Politics
  • Crime
  • Lifestyle
  • Sports
  • Column
  • Interviews
  • Special Report
No Result
View All Result
Time Africa Magazine
No Result
View All Result
  • Home
  • WHO’SWHO AWARDS
  • News
  • Magazine
  • World News

Home » Column » The rise of the “shadow employee”: When ex-employees still have access

The rise of the “shadow employee”: When ex-employees still have access

According to a recent study, 89% of former employees keep valid logins, while 45% retain access to confidential data after departure

October 6, 2025
in Column
0
541
SHARES
4.5k
VIEWS
Share on FacebookShare on Twitter

JOHANNESBURG, South Africa – Imagine a marketing manager who left a company six months ago, taking their personal laptop with them. On it, unbeknownst to anyone, was a cached login to a shared cloud drive containing sensitive client proposals and campaign strategies – access that was simply overlooked during offboarding. Months later, the ex-employee accidentally drags a folder from that shared drive onto a public-facing personal cloud storage, thinking it was their own. The link to this inadvertently exposed data is then discovered by a competitor or a data broker, leading to a massive leak of proprietary information, significant reputational damage, and a loss of client trust. This seemingly innocuous oversight, can spiral into a devastating corporate crisis. While this scenario is a little extreme, it is unfortunately not far-fetched in today’s complex digital landscape.

When an employee leaves an organisation, most leaders focus on succession, handovers and HR paperwork. But behind the scenes, another risk often goes unchecked: the “shadow employee”. Retaining access to company systems long after they’ve left, these ex-staff members pose a serious cybersecurity threat that can lead to data breaches, financial loss and reputational damage – even if everyone parted ways with smiles, hugs and pizza.

According to a recent study, 89% of former employees keep valid logins, while 45% retain access to confidential data after departure. Most disturbingly, almost half admitted to continuing to access company systems after leaving.

“The shadow employee phenomenon is more common than many realise, particularly in organisations with high staff turnover or fragmented and cloud based systems,” asserts Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa.

ReadAlso

Oando Records 164% Increase in Financials, Posts ₦210bn Profit in Nine Months

New Research Reveals How Digital Platforms are Being Weaponised to Abuse and Exploit Women in Kenya

She says it often goes undetected because access management tends to focus more on onboarding than offboarding. “When IT and HR operate in silos or access isn’t centrally tracked, it’s easy for credentials, third-party accounts or shadow IT tools to be overlooked,” Collard comments. “It shouldn’t be seen as just a technical issue; it’s a human one, too, where attention to digital hygiene and processes are lacking.”

Risks of rogue access

The threat of shadow employees was brought into sharp focus in 2023 when a US company suffered a major data leak traced back to a former IT consultant whose access to internal drives was never revoked. The incident exposed client information and resulted in a six-figure (dollar denominated, no less) settlement on top of contract losses.

ADVERTISEMENT

“The risks are serious and multifaceted,” states Collard. “They encompass operational risk, reputational risk and financial risk.” In terms of operational risks, she explains that outdated access rights can disrupt workflows, expose sensitive information or allow unauthorised changes to systems – even inadvertently.

Regarding reputational risk, a data breach caused by a former staff member can erode customer trust and damage brand credibility. “Ex-employees with active credentials can intentionally or unintentionally cause data breaches, leak sensitive information, manipulate internal systems or impersonate staff,” she says.

“In some cases, disgruntled employees may delete or sabotage critical data,” she elaborates. “Even if there’s no malicious intent, the mere presence of active credentials outside of an organisation’s control creates vulnerabilities that threat actors can exploit, especially through credential stuffing or phishing.”

The last risk to organisations involves financial risk. “Rogue access can result in regulatory fines, legal costs and lost revenue,” she says. The reason why these security breaches occur is that many organisations treat offboarding as an almost “optional HR thing”, not a cybersecurity event. “They fail to conduct thorough access audits or delay revoking credentials across all systems, especially cloud platforms, collaboration tools and unmanaged software-as-a-service (SaaS) applications,” argues Collard.

Why robust offboarding is key

To close the loop and reduce the shadow employee threat, organisations must build strong offboarding processes that bridge HR and cybersecurity. “It starts with a shared mindset: offboarding must be seen as a collaborative security process, not just an admin task,” she comments.

Another important step is to automate deprovisioning to revoke access in real-time. “Integrating identity and access management (IAM) tools and involving security or risk teams in offboarding governance can also help,” she says. Other action items include performing regular access reviews to identify dormant or unauthorised accounts and educating managers to close the gap on shadow IT.

“Make line managers accountable for flagging all tools and systems used by exiting staff and track unofficial tools in your access control system,” she recommends. The HRM Report also noted that “Shadow AI” use is a growing concern across Africa, with 46% of organisations still developing formal AI policies while staff increasingly use generative AI from work networks without checks on credentials or information sharing. This lack of governance around new technologies further underscores the need for robust offboarding processes that account for all forms of access, not just traditional systems.

In conclusion, Collard maintains that former employees shouldn’t keep the digital keys to your organisation’s kingdom. “As the workplace becomes more hybrid and decentralised, organisations must rethink offboarding as a critical component of cybersecurity hygiene,” she emphasises.
Distributed by APO Group on behalf of KnowBe4.

Contact details:
KnowBe4
Anne Dolinschek
[email protected]

Red Ribbon
TJ Coenraad
[email protected]

Tags: BusinessInternet Technology
ADVERTISEMENT
Previous Post

Moody’s Affirms Africa Finance Corporation’s (AFC) A3 Rating

Next Post

Survivors of wartime sexual violence in DRC finally get justice 

You MayAlso Like

Column

UK restricts travel to Nigerian states – What this means for Nigerians, travellers and policy

November 9, 2025
Photo Source: © MARWAN MOHAMED/AFP via Getty Images
Column

Can the world prevent a genocide in Sudan?

November 8, 2025
Column

Christians watched their families burned alive in Nigeria. Now Trump is threatening to invade

November 4, 2025
Column

New Research Reveals How Digital Platforms are Being Weaponised to Abuse and Exploit Women in Kenya

October 30, 2025
Column

Peter Obi | The Imperative of Diversifying Port Development in Nigeria

October 25, 2025
Column

PDP: Why Tanimu Turaki Holds the Key to Party Rebirth

October 20, 2025
Next Post

Survivors of wartime sexual violence in DRC finally get justice 

Trump Is Losing His Geoeconomic War

Discussion about this post

‘I give up, I will go back’ – Regina Daniels breaks down in tears

“Regina and Her Family Are Causing Turmoil: Here’s My Side!” – Ned Nwoko

What Became of Gaddafi’s Surviving Children

Mali: al-Qaeda jihadists kidnap Female TikToker executed her in front of her family

Southern Nigeria Monarchs Convene in Owerri to Strengthen Traditional Leadership, Appoint Uzodinma National Coordinator

Futility of Installing Mao Ohuabunwa as PDP BoT Chairman

  • British government apologizes to Peter Obi, as hired impostors, master manipulators on rampage abroad

    1243 shares
    Share 497 Tweet 311
  • Maids trafficked and sold to wealthy Saudis on black market

    1069 shares
    Share 428 Tweet 267
  • Flight Attendant Sees Late Husband On Plane

    976 shares
    Share 390 Tweet 244
  • ‘Céline Dion Dead 2023’: Singer killed By Internet Death Hoax

    905 shares
    Share 362 Tweet 226
  • Crisis echoes, fears grow in Amechi Awkunanaw in Enugu State

    739 shares
    Share 296 Tweet 185
  • Trending
  • Comments
  • Latest

British government apologizes to Peter Obi, as hired impostors, master manipulators on rampage abroad

April 13, 2023

Maids trafficked and sold to wealthy Saudis on black market

December 27, 2022
Flight Attendant Sees Late Husband On Plane

Flight Attendant Sees Late Husband On Plane

September 22, 2023
‘Céline Dion Dead 2023’: Singer killed By Internet Death Hoax

‘Céline Dion Dead 2023’: Singer killed By Internet Death Hoax

March 21, 2023
Chief Mrs Ebelechukwu, wife of Willie Obiano, former governor of Anambra state

NIGERIA: No, wife of Biafran warlord, Bianca Ojukwu lied – Ebele Obiano:

0

SOUTH AFRICA: TO LEAVE OR NOT TO LEAVE?

0
kelechi iheanacho

TOP SCORER: IHEANACHA

0
Goodluck Ebele Jonathan

WHAT CAN’TBE TAKEN AWAY FROM JONATHAN

0

BBC apologises to Trump over Panorama edit but rejects demand for $1bn compensation

November 14, 2025

Ibadan 2025: PDP’s Convention as a Test of Survival and Unity

November 14, 2025

FEDA Announces Investment in Africa Minerals and Metals Processing

November 13, 2025
Chinese President Xi Jinping reviews the honour guard during a welcome ceremony at The Great Hall of the People on November 22, 2023 in Beijing, China
(Image credit: Florence Lo - Pool / Getty Images)

Xi’s Military Purges Show Unease About China’s Nuclear Forces

November 12, 2025

ABOUT US

Time Africa Magazine

TIMEAFRICA MAGAZINE is an African Magazine with a culture of excellence; a magazine without peer. Nearly a third of its readers hold advanced degrees and include novelists, … READ MORE >>

SECTIONS

  • Aviation
  • Column
  • Crime
  • Europe
  • Featured
  • Gallery
  • Health
  • Interviews
  • Israel-Hamas
  • Lifestyle
  • Magazine
  • Middle-East
  • News
  • Politics
  • Press Release
  • Russia-Ukraine
  • Science
  • Special Report
  • Sports
  • TV/Radio
  • UAE
  • UK
  • US
  • World News

Useful Links

  • AllAfrica
  • Channel Africa
  • El Khabar
  • The Guardian
  • Cairo Live
  • Le Republicain
  • Magazine: 9771144975608
  • Subscribe to TIMEAFRICA MAGAZINE biweekly news magazine

    Enjoy handpicked stories from around African continent,
    delivered anywhere in the world

    Subscribe

    • About TimeAfrica Magazine
    • Privacy Policy
    • Contact Us
    • WHO’SWHO AWARDS

    © 2025 TimeAfrica Magazine - All Right Reserved. TimeAfrica Magazine Ltd is published by Times Associates, registered Nigeria. Use of this site constitutes acceptance of our Terms of Service.

    No Result
    View All Result
    • WHO’SWHO AWARDS
    • Politics
    • Column
    • Interviews
    • Gallery
    • Lifestyle
    • Special Report
    • Sports
    • TV/Radio
    • Aviation
    • Health
    • Science
    • World News

    © 2025 TimeAfrica Magazine - All Right Reserved. TimeAfrica Magazine Ltd is published by Times Associates, registered Nigeria. Use of this site constitutes acceptance of our Terms of Service.

    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.