Sitting on a Powder Keg: What CEOs Must Address in Their IT Landscape – Part Three

Person working at laptop with different web icons overlaid
Farica Chang

By Farica Chang, Managing Principal

Key in the right combination of letters in May 2016, and you could’ve gained access to the Twitter, Instagram, and Pinterest accounts of one of the founding fathers of social media.

Turns out, even Mark Zuckerberg wasn’t safe from account compromise—or the consequences of not enforcing strong access controls.

By reusing the same password and (presumably) opting out of multifactor authentication (MFA), the multibillionaire made it all too easy for hackers to take advantage of a LinkedIn data leak that revealed over 160 million passwords and temporarily deactivate his Twitter account.

The magic word in question? ‘Dadada’. And while the (at the time) new parent made it through the incident with no more than some ego bruising, things don’t always work out that way. Here’s how to avoid your business meeting a far worse fate…

What Are Access Controls, and Why Do They Matter?

Access controls refer to the measures you use to regulate who can access your company’s systems, data, and applications. When these controls are sub-standard, businesses become vulnerable to unauthorized access, data breaches, and cyberattacks.

Imagine a former employee’s account is never deactivated after they leave the company. Months later, this account, still linked to sensitive systems, is compromised in a phishing attack. The attacker gains access to customer data, internal documents, and even financial records—all without raising suspicion because the account appears legitimate.

This is why a simple oversight in managing access can escalate into a serious and expensive security breach. Without strong access controls, you leave yourself open to entirely avoidable risks that can harm your operations, reputation, and bottom line.

How to Know If You’ve Got Weak Access Controls: The Telltale Signs

Weak access controls are often overlooked because they don’t announce themselves loudly. Instead, they quietly erode your defenses, leaving your business exposed without you even realizing it.

Fortunately, finding out if you’re guilty of having lax access controls is easy. Look for the most common faux pas:

1. Not Consistently Enforcing Password Policies

Employees reusing passwords or opting for “123456” and “password” is more common than you might think. Although you might have policies encouraging the use of strong passwords in place, if you’re not enforcing them, even your best IT system and most trustworthy employee could be vulnerable.

2. Not Using a Password Manager

A lack of centralized password management means your staff may store passwords in insecure locations—think sticky notes, spreadsheets, in their browser, or unsecured personal .

Password management tools like Keeper ensure credentials are stored securely but remain easy to access when needed.

3. Inconsistent Multi-Factor Authentication (MFA) Use

MFA should be non-negotiable. Yet, many businesses only enforce it selectively. Often, it’s actually the executives who bypass this extra layer of security or dissuade their IT department from enforcing it altogether. But as you’re about to find out, MFA is important for everyone, no matter how busy they are…

Where Weak Access Controls Pose the Biggest Problem

You might assume entry-level employees or new starters pose the biggest risk when it comes to weak access controls. After all, they’re less experienced and might unknowingly make mistakes.

The reality is quite the opposite—it’s actually the C-suite that’s your most significant vulnerability.

Executives typically have access to more sensitive data, systems, and financial resources than anyone else in the organization, and this elevated access makes them a prime target for cybercriminals. Yet a 2020 survey by MobileIron found that they’re the most likely group within a business to ask for more relaxed security protocols.

What’s worse? Executives often bypass the security awareness training the rest of your employees undergo. So, not only are they more vulnerable—they’re also far less aware of their high-risk habits (and how to fix them).

How to Strengthen Weak Access Controls

You don’t have to—and definitely shouldn’t—leave this digital powder keg exposed. By implementing the following strategies, you can significantly reduce your risk of a security breach due to weak access controls:

1. Audit Access Regularly

Conduct a comprehensive review of who has access to what. Start by answering these critical questions:

  • Are there employees with access to systems they don’t use or need?
  • Are there accounts belonging to ex-employees still active?
  • Have your team members’ role changes been reflected in access permissions?
2. Remove Unnecessary Access

Follow the ensure that employees only have access to the data and systems necessary for their role. This limits potential damage if an account is compromised.

3.Enforce MFA for All Users

Make MFA mandatory for every employee, from interns to executives. But don’t stop there—enhance it with conditional access policies.

For example:

  • Restrict access based on geographic location or device type.
  • Deny access from unrecognized devices or IP addresses.
  • Enforce stricter controls for high-risk actions, like financial transactions or downloading large datasets.
4. Invest in a Password Manager

A password manager allows employees to create, store, and share passwords securely without having to remember each one. Knowing you have these tools in place also enables your IT team to enforce password policies more effectively—one solution is applied consistently across your team, keeping your business safer.

5. Train and Educate Employees

Cybersecurity awareness training isn’t just for entry-level staff. Ensure that everyone in your organization understands the risks and consequences of lacking security practices—including executives.

When the leadership team sets an example, the rest of the company is more likely to follow.

6. Implement Role-Based Access Policies

Define access permissions based on job roles rather than individuals. This ensures that when someone changes roles or leaves the company, their access is updated or revoked automatically—saving the time you’ll spend on auditing permissions in the future.

Turn Weakness into Strength

Enhancing your access controls isn’t just about preventing disasters; it’s about positioning your business for success. Secure systems mean more trust from clients, greater operational efficiency, and fewer sleepless nights for you as a business owner.

So, take action. Start with an audit of your current practices, enforce MFA, and lead by example. Your IT landscape doesn’t have to be a powder keg—with a little work (and some expert advice), it can become a fortress.

Join the Conversation

On December 10th, we’re hosting a LinkedIn Live session to tackle your most pressing cybersecurity questions. Don’t miss this opportunity to learn from experts and take proactive steps to protect your business. Follow us on LinkedIn to stay updated!

Anderson Technologies: Real People Creating Business-Changing IT Solutions

For over 25 years, Anderson Technologies has leveraged our expertise for the benefit of our clients, supplying them with suitable, secure IT and strategic guidance for their technological future.

We’re a dynamic team of IT professionals with over 200 years of combined experience and specialist certifications to back up our knowledge. As a trusted advisor, we don’t just focus on today. We strive to take your technology light-years ahead of your competition and scale with your business’s success.

Ready to secure your business? Contact us today to get started.

In 2022, Hadley and her husband Corbitt decided to return to St. Louis to join the family business. As part of the second generation, Hadley brought fresh perspectives from her time at AT&T and was drawn to helping the company grow the right way by implementing scalable systems and processes, while maintaining the core value-centric culture.
 
As a Project Manager, Hadley facilitated technical projects and the development of interdepartmental playbooks while gaining a deep understanding of the inner workings of the business operations. Now, as the Project Management Lead, Hadley is known for her driven, process-oriented leadership and her dedication to finding solutions for every challenge no matter how daunting it may first seem.

Born in Yokohama, Japan, and raised in Malaysia and St. Louis, Corbitt developed a unique global perspective. He graduated from Randolph-Macon College with a degree in Political Science and Spanish where he was a member of the men’s basketball team.

Before joining Anderson Technologies, Corbitt built a successful career at AT&T which initially started in the B2B Sales Development Program – a highly-competitive sales training where he was stack-ranked against his 100+ peers based on quota attainment to determine where in the company one was placed. In Chicago, as part of the National Fiber Organization, he became a top-performing sales professional, selling AT&T’s fiber, networking, and cybersecurity services and learning the value of relationship building, perseverance, and grit. Later, as a Senior Sales Solutions Engineer at AT&T headquarters in Dallas, he refined his technical expertise, leadership skills, and consulting abilities.

Currently pursuing his MBA at Washington University in St. Louis, Corbitt blends strategic thinking, technical knowledge, and a client-first approach to help Anderson Technologies continue serving companies and organizations across the country.

Corbitt Grow Headshot