Think about your life today. When are your interests and actions not being anticipated and predicted by someone or some company? From online shopping recommendations, to the \u201cyou might like this\u201d this movie suggestions and recommended news articles \u2013 customized information and services are continually being pushed to you as the consumer. And in my opinion, these predictions are getting more and more prevalent.\n\u00a0Your workforce now has those same expectations for the availability of technology services and applications at work. They are demanding solutions that predict their needs and automatically deliver the services they need to effectively perform their jobs. Unlike the consumer world where lack of predictive qualities have little negative impact on the consumer (in fact, for me poor predictions leave me a little wealthier), in the enterprise it can lead to greater security risk.\u00a0When business consumers don\u2019t receive the right level of access they can become rowdy and the \u201cwork-around\u201d mentality sets in \u2013 exposing the business to security vulnerabilities.\nThis leads me to the next security truth\u00a0in my\u00a0Five Important Truths about Digital Workspaces in a Dangerous World\u00a0blog series\u2026\u00a0\nShadow IT Often Starts during Onboarding\nNothing encourages\u00a0Shadow IT\u00a0more than when a new employee has been onboard for over a week and still doesn\u2019t have the access they need to do their job. When that employee becomes frustrated they often:\n\nFind what they need on their own \u2013 usually a cloud option from the internet\nOr, ask a colleague what workaround they can use to get what they need\n\nTribal knowledge is one of the guiltiest vehicles for passing down workarounds \u2013 but it can have a huge impact on increasing security threat levels for IT.\nTo prevent new security gaps from expanding with every new hire, strong predictive and automated onboarding policies must be put in place.\u00a0Not only does strong onboarding improve employee morale and higher productivity rates, but it also reduces the risk of employees going outside IT sanctioned policies to bring in unapproved, and potentially risky, applications.\nFor Every Role Change (Action) There Should Be Security Changes (Reaction)\nThroughout the lifecycle of an employee, their role will change or at least evolve. It is critical that as this evolution occurs, so should their access to resources and authorization levels. If your IT organization is not predicting the changing access needs, then you will fall victim to granting access by request only. Always on the defensive.\nIf you can predict each employee\u2019s needs changing based on role and context, then not only can you provide the right access at the right time, but you can also revoke access when it is no longer needed. Reducing the threat of a significant security gap in many organizations \u2013\u00a0few people lose access through their employment tenure.\nYour Top Internal Threat is Poor Offboarding\nI was amazed once again to hear in the news about the absence of proper offboarding. This time it was an organization that houses some of the country\u2019s most private information \u2013 the IRS. A report stated that the \u201cIRS does not always delete employee access when workers quit or are fired.\u201d Really IRS? You house each US citizen\u2019s social security number, financial earnings, address, and more. But when people get fired, they still have access? Why wasn\u2019t this a top security concern?\nThis type of behavior happens significantly more than anyone would like to believe. One of the main reasons is lack of communication. When someone leaves an organization, HR is notified but who notifies IT? Now\u00a0IT can\u2019t predict when someone will leave, but they can predict what privileges need to be revoked\u00a0when HR changes someone\u2019s profile from employed to no longer employed, if they have the right automation solution in place.\nIn order to avoid the security vulnerabilities outlined here, organizations need to invest in the prediction, automation, and controlled provisioning\/de-provisioning of employees\u2019 digital workspaces.\u00a0 This will give the workforce the technology necessary for productivity while maintaining a centralized policy-based governance model ensuring security and compliance.\nNow is the time to ask yourself \u2013\u00a0how well does your organization predict your workforce needs based on each employee\u2019s lifecycle?\nFor more of the\u00a05 Important Truths about Digital Workspaces in a Dangerous World, check out the full\u00a0blog series here.\nOr you can download\u00a0the full whitepaper here.