The Access That Outlived the Employment
Kandula Nagaraju was terminated in October 2022 for poor performance. His last day at NCS, a major IT services company in Singapore with over 13,000 employees, was November 16, 2022.
His access to company systems sho offboarding, access management, insider threat, identity management, employee termination should have ended that day. It didn’t.
In January 2023, Nagaraju logged in remotely. Then again in February. Then thirteen more times in March. He wasn’t checking email or grabbing personal files. He was writing and testing deletion scripts.
On March 18-19, 2023, he executed them. One hundred eighty virtual servers disappeared.
The cost estimate: $678,000. His sentence: two years and eight months in prison.
Take the 2-Minute Cybersecurity Assessment: https://centrexit.com/cyber-security-readiness-assessment/
The Seven-Day Problem
Most organizations have an offboarding process. HR sends a notification. IT is supposed to disable accounts. Badges get deactivated. Laptops get returned.
But research consistently shows that former employee access persists far longer than it should. Sometimes it’s oversight. Sometimes it’s process failure. Sometimes no one knows all the systems a person could access.
Nagaraju had been a QA team member with access to testing systems. No one thought to check whether his administrator credentials still worked months after his termination.
What Former Employees Still Have Access To
The obvious systems get locked quickly: email, primary login, badge access. But what about:
- Cloud services with separate logins? That project management tool. The shared document platform. The analytics dashboard. Each might have its own credentials that nobody remembered to revoke.
- Shared accounts and passwords? The generic login everyone uses for that one system. The admin password that hasn’t changed in years. The “emergency access” credentials written on a sticky note.
- Personal devices with company data? If someone had company email on their phone, did they remove it? If they saved files locally, do they still have copies?
- Third-party access? Could they still log into a vendor portal using their company credentials? Could they still approve purchases or access financial systems?
- VPN and remote access? Nagaraju didn’t walk into the NCS office. He connected remotely, six times over several months, without anyone noticing.

Why This Keeps Happening
Offboarding failures aren’t usually malicious. They’re systemic:
- No single source of truth. HR knows what departments someone worked in. IT knows what computers they used. But no one has a complete picture of every system and every credential a person accumulated over years of employment.
- Shadow IT creates blind spots. When employees sign up for tools without IT approval, those tools aren’t on any offboarding checklist. IT can’t revoke access to systems they don’t know exist.
- Separation is often rushed. Involuntary terminations happen quickly. The focus is on legal compliance and security escorts, not methodical access reviews.
- Verification rarely happens. Someone checks a box saying access was revoked. Did anyone actually verify it worked? Did anyone try logging in with those credentials to confirm they were disabled?
The Damage Former Employees Can Do
Nagaraju deleted test servers. It could have been worse. Former employees have stolen customer data before competitors hired them, deleted years of work to sabotage projects, downloaded proprietary information to start competing businesses, shared credentials with outsiders seeking access, installed backdoors for future access, and held data hostage until severance disputes were resolved.
The common thread: all of them still had access after they shouldn’t have.
Fixing the Seven-Day Problem
The goal is simple: within seven days of any departure, a former employee should have zero access to any company system. Achieving that requires:
- A complete access inventory. You can’t revoke access you don’t know exists. Document every system, every shared credential, every third-party platform that employees touch.
- Automated offboarding triggers. When HR processes a termination, that should automatically trigger access revocation across all systems—not create a ticket that sits in a queue.
- Separation of duties. The person who has access to critical systems shouldn’t be the only person who knows they have that access. Administrative credentials should be documented and managed centrally.
- Verification testing. Don’t just disable accounts. Test that they’re actually disabled. Try logging in. Confirm the door is actually locked.
- Regular access reviews. Don’t wait for departures. Periodically audit who has access to what. You’ll find active credentials for people who left years ago.
The Question for Your Organization
Think about the last person who left your organization. Could you list every system they had access to? Every shared password they knew? Every cloud service they’d signed up for?
If someone from your organization was terminated today and wanted to cause damage next month, what could they still access?
Take the 2-Minute Cybersecurity Assessment: https://centrexit.com/cyber-security-readiness-assessment/
centrexIT helps organizations build offboarding processes that actually work. If you’re not sure what a former employee could still access, let’s find out together.
Sources
BleepingComputer: “Former IT employee gets 2.5 years for wiping 180 virtual servers” (June 2024)
Tom’s Hardware: “Disgruntled ex-employee costs company over $600,000 after he deletes all 180 of its test servers” (June 2024)
CNA (Channel News Asia): “Man jailed for deleting 180 virtual servers after being fired from IT job” (June 2024)



