Imagine making a dozen copies of the keys to your house, labeling those keys with an address, and handing them to the first 12 strangers you see. You wouldn’t, would you?
But say someone who had a copy of your house key decided they wanted to widely disseminate it. Could you stop them? Should they have had the key in the first place? Unwittingly, companies that do not regularly control and review permissions, by which we mean access to specific information and actions, run the risk of stirring access with malevolence—handing the keys to the kingdom to the wrong person.Read More