"Ghosts" in the machine

There may be “ghosts” haunting your networks – inactive users or inactive computers that remain part of your system, even if they are no longer contributing to your productivity. While the threat may not be immediately obvious, defunct computers represent an expense you don’t need to carry. Worse, inactive users may reflect open accounts (perhaps of people who are no longer employed by your business) that could present security holes for unauthorized access. Run audits that show you what’s active or not, then clean house – and close security loopholes – by burying the “dead” devices and accounts.