Power

How to manage Slack and email for laid-off and furloughed workers

Mass layoffs carry a cybersecurity risk, experts warn.

A disgruntled worker sitting at her computer in the dark

Cybersecurity professionals have long recognized that data breaches can come from disgruntled or fired employees.

Photo: FG Trade via Getty Images

As more people are laid-off and furloughed due to the economic impacts of the coronavirus pandemic, businesses are left with the difficult task of removing employees from company systems securely and protecting data and IP.

Cybersecurity professionals have long recognized that data breaches can come from disgruntled or fired employees. These insider threat incidents might be more destructive and costly now than they have been in the past, such as during the mass layoffs of the 2008 financial crisis, because many employees have access to huge amounts of data through tools including Slack, Box and OneDrive that can be transferred with ease to a personal email or thumb drive, said Joe Payne, chief executive of cybersecurity firm Code42.

"The collaboration tools that are helping us survive this crisis … make it easy for employees to take critical company data — customer lists, product plans, source code — when they leave the organization. They are especially likely to do this when laid off," Payne said in an email.

It's likely necessary to lock down access to email and other data quickly in both cases of layoffs and furloughs. But Shawn Henry, chief security officer at CrowdStrike. said communicating this empathetically can go a long way toward quelling employee resentment, particularly in situations where it's possible the employee will be rehired in the future. For example a manager might say, "We're looking to minimize the risk to our company, and in doing that we're minimizing who has access to that data."

In his advice on managing layoffs, Andreessen Horowitz's David Ulevitch recommended that companies revoke access to resources like email on the day an employee is notified of termination. He also wrote that it might be appropriate to let employees use their laptops after their last day, especially in current situations when people are working remotely, and you can't retrieve the device immediately. Still, he cautions to evaluate the security and intellectual property implications before letting employees keep devices indefinitely.

Staying ahead of insider threats

Cybersecurity experts said there are a number of tools and procedures that organizations should have in place to detect and prevent insider threats from laid-off employees. The first step is identifying the company's "crown jewels," or the data and systems that are the most valuable and vulnerable, said Jon Ford, a director at the cybersecurity and incident response firm FireEye. Companies should limit who has access to these systems and data in the first place, and should cut off access quickly when employees leave the company, said Shuman Ghosemajumder, global head of AI at F5 Networks, a maker of application security technology.

Security teams can deploy technology that monitors employee behavior and actions to identify early signs of an insider threat, said McAfee Chief Technology Officer Steve Grobman. "If all of a sudden you see an employee who has never accessed the customer database download the whole thing, you need to look for those types of events," he said. Other tools can block attempts to exfiltrate that data by preventing screenshots, print jobs or transferring it to another device, depending on how sensitive the data is, Ford said.

Security teams should also involve HR and business leaders in their insider threat detection plans to better understand who has rich access to company systems and data, and who is likely to take out their frustration on the organization if they're fired.

"Insider threats are going to become much more prevalent as we look ahead," Ford said. "Our practices have evolved around external hackers … but insider threats can have a much more detrimental impact, and remediation can be much more exorbitant for an internal attacker versus an external one."

Furloughs make things more complicated

Companies might want to consider allowing furloughed employees or other workers who they hope to rehire to retain temporary access to their corporate devices and some applications, said Sandra Sucher, a professor of management practice at Harvard Business School who has written extensively on layoffs and workforce changes.

"You need to ask what the application is being used for; if Slack is being used to communicate in detail about confidential work information, that's a different story, but if it's being used the way I see it being used in a lot of organizations, it's more of a social network," she said. "Allowing them to keep access will maintain a connection, and the company will be rewarded when they need to reconstitute their workforce." Companies in highly regulated industries, such as finance or health care, might be required to cut off access completely, she added.

Some good news for companies is that there are technologies they can deploy to help closely manage who can access what corporate data. Okta, an identity and access management firm, has tools that allow businesses to immediately deprovision an employee's access to sensitive applications following a layoff, but maintain access to other services, such as a general Slack channel. The tools can also retain all the data, so if an employee rejoins the company, they will still have access to documents or other information that was temporarily made inaccessible, said Okta co-founder and Chief Operating Officer Frederic Kerrest.

"There are a lot of humane reasons to do things like allowing people to keep access to specific Slack channels and video conferencing apps," he said. "You definitely want to ensure that [if they rejoin the organization] you get them with a high morale and get reintegrated as fast as possible."

The danger is very real

One challenge to managing technology access of employees who are being let go is that the results can be devastating. F5 Networks' Ghosemajumder said that while most laid-off workers will behave professionally and ethically, a small percentage will try to harm their former employers. These types of incidents can be particularly damaging and difficult to detect because the employee might have legitimate access to the data and systems that they are targeting and likely know the organization better than an external hacker would. The average cost of an insider threat incident was $8.7 million in 2018, according to a report by the Ponemon Institute. This can include the cost of an investigation, remediation, legal fees, reputational damage, and the value of lost or destroyed IP.

One example that shows how much damage an employee can do to a corporate computer network happened at the Canadian Pacific Railway and resulted in a felony. In 2018, the U.S. Department of Justice announced that Christopher Grupe, a former IT employee of the CPR, was sentenced to a year in prison for intentionally damaging the company's computer network. Upon being informed that he was going to be fired, Grupe "strategically deleted files, removed administrative-level accounts, and changed passwords on the remaining administrative-level accounts, thereby locking CPR out of" its core computer network that handled critical data, according to the announcement. "Grupe then attempted to conceal his activity by wiping the laptop's hard drive before returning it to CPR."


Get in touch with us: Share information securely with Protocol via encrypted Signal or WhatsApp message, at 415-214-4715 or through our anonymous SecureDrop.


Cybersecurity experts say a more common scenario involves employees who take sensitive corporate data or valuable intellectual property when they leave an organization. Last month, for example, former Google engineer Anthony Levandowski admitted to downloading thousands of documents about the company's self-driving program in 2015 and transferring them to his personal laptop.

This type of behavior is surprisingly common, studies show. According to a 2019 report from Code42, 65% of security professionals admit to taking company information to their next job.

FireEye has also noticed a new trend where employees don't just take data on their way out the door and use it in their new job — they try to extort the company for money, Ford said. "Last year we saw several cases where an insider extorted a company with data they had stolen. In several cases, they stated they were an external actor, but forensic evidence pointed towards them, and law enforcement either arrested or interviewed them," he said.

Fintech

Judge Zia Faruqui is trying to teach you crypto, one ‘SNL’ reference at a time

His decisions on major cryptocurrency cases have quoted "The Big Lebowski," "SNL," and "Dr. Strangelove." That’s because he wants you — yes, you — to read them.

The ways Zia Faruqui (right) has weighed on cases that have come before him can give lawyers clues as to what legal frameworks will pass muster.

Photo: Carolyn Van Houten/The Washington Post via Getty Images

“Cryptocurrency and related software analytics tools are ‘The wave of the future, Dude. One hundred percent electronic.’”

That’s not a quote from "The Big Lebowski" — at least, not directly. It’s a quote from a Washington, D.C., district court memorandum opinion on the role cryptocurrency analytics tools can play in government investigations. The author is Magistrate Judge Zia Faruqui.

Keep ReadingShow less
Veronica Irwin

Veronica Irwin (@vronirwin) is a San Francisco-based reporter at Protocol covering fintech. Previously she was at the San Francisco Examiner, covering tech from a hyper-local angle. Before that, her byline was featured in SF Weekly, The Nation, Techworker, Ms. Magazine and The Frisc.

The financial technology transformation is driving competition, creating consumer choice, and shaping the future of finance. Hear from seven fintech leaders who are reshaping the future of finance, and join the inaugural Financial Technology Association Fintech Summit to learn more.

Keep ReadingShow less
FTA
The Financial Technology Association (FTA) represents industry leaders shaping the future of finance. We champion the power of technology-centered financial services and advocate for the modernization of financial regulation to support inclusion and responsible innovation.
Enterprise

AWS CEO: The cloud isn’t just about technology

As AWS preps for its annual re:Invent conference, Adam Selipsky talks product strategy, support for hybrid environments, and the value of the cloud in uncertain economic times.

Photo: Noah Berger/Getty Images for Amazon Web Services

AWS is gearing up for re:Invent, its annual cloud computing conference where announcements this year are expected to focus on its end-to-end data strategy and delivering new industry-specific services.

It will be the second re:Invent with CEO Adam Selipsky as leader of the industry’s largest cloud provider after his return last year to AWS from data visualization company Tableau Software.

Keep ReadingShow less
Donna Goodison

Donna Goodison (@dgoodison) is Protocol's senior reporter focusing on enterprise infrastructure technology, from the 'Big 3' cloud computing providers to data centers. She previously covered the public cloud at CRN after 15 years as a business reporter for the Boston Herald. Based in Massachusetts, she also has worked as a Boston Globe freelancer, business reporter at the Boston Business Journal and real estate reporter at Banker & Tradesman after toiling at weekly newspapers.

Image: Protocol

We launched Protocol in February 2020 to cover the evolving power center of tech. It is with deep sadness that just under three years later, we are winding down the publication.

As of today, we will not publish any more stories. All of our newsletters, apart from our flagship, Source Code, will no longer be sent. Source Code will be published and sent for the next few weeks, but it will also close down in December.

Keep ReadingShow less
Bennett Richardson

Bennett Richardson ( @bennettrich) is the president of Protocol. Prior to joining Protocol in 2019, Bennett was executive director of global strategic partnerships at POLITICO, where he led strategic growth efforts including POLITICO's European expansion in Brussels and POLITICO's creative agency POLITICO Focus during his six years with the company. Prior to POLITICO, Bennett was co-founder and CMO of Hinge, the mobile dating company recently acquired by Match Group. Bennett began his career in digital and social brand marketing working with major brands across tech, energy, and health care at leading marketing and communications agencies including Edelman and GMMB. Bennett is originally from Portland, Maine, and received his bachelor's degree from Colgate University.

Enterprise

Why large enterprises struggle to find suitable platforms for MLops

As companies expand their use of AI beyond running just a few machine learning models, and as larger enterprises go from deploying hundreds of models to thousands and even millions of models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

As companies expand their use of AI beyond running just a few machine learning models, ML practitioners say that they have yet to find what they need from prepackaged MLops systems.

Photo: artpartner-images via Getty Images

On any given day, Lily AI runs hundreds of machine learning models using computer vision and natural language processing that are customized for its retail and ecommerce clients to make website product recommendations, forecast demand, and plan merchandising. But this spring when the company was in the market for a machine learning operations platform to manage its expanding model roster, it wasn’t easy to find a suitable off-the-shelf system that could handle such a large number of models in deployment while also meeting other criteria.

Some MLops platforms are not well-suited for maintaining even more than 10 machine learning models when it comes to keeping track of data, navigating their user interfaces, or reporting capabilities, Matthew Nokleby, machine learning manager for Lily AI’s product intelligence team, told Protocol earlier this year. “The duct tape starts to show,” he said.

Keep ReadingShow less
Kate Kaye

Kate Kaye is an award-winning multimedia reporter digging deep and telling print, digital and audio stories. She covers AI and data for Protocol. Her reporting on AI and tech ethics issues has been published in OneZero, Fast Company, MIT Technology Review, CityLab, Ad Age and Digiday and heard on NPR. Kate is the creator of RedTailMedia.org and is the author of "Campaign '08: A Turning Point for Digital Media," a book about how the 2008 presidential campaigns used digital media and data.

Latest Stories
Bulletins