{"id":8266,"date":"2025-03-13T09:44:47","date_gmt":"2025-03-13T09:44:47","guid":{"rendered":"https:\/\/login-master.com\/the-cyber-risk-of-orphaned-accounts-an-interview-with-stephanie-ta\/"},"modified":"2025-03-13T09:57:12","modified_gmt":"2025-03-13T09:57:12","slug":"the-cyber-risk-due-to-orphaned-accounts","status":"publish","type":"post","link":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/","title":{"rendered":"The cyber risk of orphaned accounts &#8211; an interview with Stephanie Ta"},"content":{"rendered":"<p><strong>Stephanie Ta in an interview with Roberto Popolizio from Website Planet<\/strong><\/p>\n<p>February 24, 2025<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/robpopolizio\/\" target=\"_blank\" rel=\"noopener\">Roberto<\/a> asked Stephanie what orphaned user accounts are all about and why they pose a major cyber threat.<\/p>\n<p>There are fundamental flaws in internet services that are designed to manage a large number of user accounts. For example, many self-service functions are poorly designed. They are actually intended to support the user and automatically simplify the handling of their own account. The user experience is an important aspect here.<\/p>\n<p>Human behavior also plays a major role, because sometimes it is easier to create a new account than to reset the password because you have simply forgotten it.<\/p>\n<p>These faulty processes lead to more and more accounts being created, over which companies and providers lose control. Pishing and other hacking methods make it easy for cyber criminals to hijack these user accounts and misuse them for their own purposes.<\/p>\n<p>For website operators, especially the readers of Website Planet, it is important to know that unused accounts represent a major cyber risk for them and their users.<\/p>\n<p>You can read the whole interview on Website Planet:<\/p>\n<p><a href=\"https:\/\/www.websiteplanet.com\/blog\/syntlogo-interview\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.websiteplanet.com\/blog\/syntlogo-interview\/<\/a><\/p>\n<p>Interested? &#8211; Follow me for more cyber tips on <a href=\"https:\/\/www.linkedin.com\/in\/stephanie-ta-645aa32\/\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> and read my article on \u201c<a href=\"https:\/\/login-master.com\/en\/best-practices-cyber-security-inactive-accounts\/\" target=\"_blank\" rel=\"noopener\">Cyber Security Best Practices: Inactive Accounts<\/a>\u201d here on our IAM blog.<\/p>\n<p>Another interview on the topic: \u201cChanging passwords regularly is a cyber risk\u201d can be found here: <a href=\"https:\/\/www.safetydetectives.com\/blog\/syntlogo-interview\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.safetydetectives.com\/blog\/syntlogo-interview\/<\/a><\/p>\n<p>&#8212;<\/p>\n<p>About Website Planet: <a href=\"https:\/\/www.websiteplanet.com\/\" target=\"_blank\" rel=\"noopener\">Website Planet<\/a> was founded in 2013 by web developers to support people or companies online who want to set up, promote or expand a web presence, in short a website. Website Planet is independent and helps to decide between different content management systems (CMS). Readers will find comparisons and assistance to help them decide for themselves what the right way to create a website is for them.<\/p>\n<p>That was: Stephanie&#8217;s insights for the readers of Website Planet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cyber risk of unused or orphaned accounts is underestimated every day. It is well known that this is a huge gateway for hackers. Stephanie explains why this is the case and what you can do about it in an interview with Website Planet.<\/p>\n","protected":false},"author":2,"featured_media":6786,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[24,48,22,40],"tags":[],"class_list":["post-8266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisation","category-iam-en","category-news","category-security-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber risk orphaned user accounts<\/title>\n<meta name=\"description\" content=\"Unused user accounts are a major cyber risk. Read here to find out how this can happen and how to increase cyber security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The cyber risk of orphaned accounts - an interview with Stephanie Ta\" \/>\n<meta property=\"og:description\" content=\"Unused user accounts are a major cyber risk. Read here to find out how this can happen and how to increase cyber security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"Login Master\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/syntlogo.die.iam.experten\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T09:44:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T09:57:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stephanie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\"},\"author\":{\"name\":\"Stephanie\",\"@id\":\"https:\/\/login-master.com\/#\/schema\/person\/73122369d6589f3c732ba3ce7b7057d2\"},\"headline\":\"The cyber risk of orphaned accounts &#8211; an interview with Stephanie Ta\",\"datePublished\":\"2025-03-13T09:44:47+00:00\",\"dateModified\":\"2025-03-13T09:57:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\"},\"wordCount\":333,\"publisher\":{\"@id\":\"https:\/\/login-master.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg\",\"articleSection\":[\"Digitalisation\",\"IAM\",\"News\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\",\"url\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\",\"name\":\"Cyber risk orphaned user accounts\",\"isPartOf\":{\"@id\":\"https:\/\/login-master.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg\",\"datePublished\":\"2025-03-13T09:44:47+00:00\",\"dateModified\":\"2025-03-13T09:57:12+00:00\",\"description\":\"Unused user accounts are a major cyber risk. Read here to find out how this can happen and how to increase cyber security.\",\"breadcrumb\":{\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage\",\"url\":\"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg\",\"contentUrl\":\"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/login-master.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The cyber risk of orphaned accounts &#8211; an interview with Stephanie Ta\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/login-master.com\/#website\",\"url\":\"https:\/\/login-master.com\/\",\"name\":\"Login Master\",\"description\":\"Identity-Access-Management for web applications and services\",\"publisher\":{\"@id\":\"https:\/\/login-master.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/login-master.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/login-master.com\/#organization\",\"name\":\"Login-master\",\"url\":\"https:\/\/login-master.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/login-master.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/login-master.com\/wp-content\/uploads\/2021\/04\/logo-login-master-500x200-opt.png\",\"contentUrl\":\"https:\/\/login-master.com\/wp-content\/uploads\/2021\/04\/logo-login-master-500x200-opt.png\",\"width\":500,\"height\":200,\"caption\":\"Login-master\"},\"image\":{\"@id\":\"https:\/\/login-master.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/syntlogo.die.iam.experten\",\"https:\/\/de.linkedin.com\/company\/syntlogo-gmbh\",\"https:\/\/de.linkedin.com\/company\/intension\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/login-master.com\/#\/schema\/person\/73122369d6589f3c732ba3ce7b7057d2\",\"name\":\"Stephanie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/58735c4344d4449c95ccfb596a075ce5306761270cec3fbea294181e41d0be4d?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58735c4344d4449c95ccfb596a075ce5306761270cec3fbea294181e41d0be4d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58735c4344d4449c95ccfb596a075ce5306761270cec3fbea294181e41d0be4d?s=96&d=mm&r=g\",\"caption\":\"Stephanie\"},\"url\":\"https:\/\/login-master.com\/en\/author\/stephanie\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber risk orphaned user accounts","description":"Unused user accounts are a major cyber risk. Read here to find out how this can happen and how to increase cyber security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/","og_locale":"en_US","og_type":"article","og_title":"The cyber risk of orphaned accounts - an interview with Stephanie Ta","og_description":"Unused user accounts are a major cyber risk. Read here to find out how this can happen and how to increase cyber security.","og_url":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/","og_site_name":"Login Master","article_publisher":"https:\/\/www.facebook.com\/syntlogo.die.iam.experten","article_published_time":"2025-03-13T09:44:47+00:00","article_modified_time":"2025-03-13T09:57:12+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg","type":"image\/jpeg"}],"author":"Stephanie","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#article","isPartOf":{"@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/"},"author":{"name":"Stephanie","@id":"https:\/\/login-master.com\/#\/schema\/person\/73122369d6589f3c732ba3ce7b7057d2"},"headline":"The cyber risk of orphaned accounts &#8211; an interview with Stephanie Ta","datePublished":"2025-03-13T09:44:47+00:00","dateModified":"2025-03-13T09:57:12+00:00","mainEntityOfPage":{"@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/"},"wordCount":333,"publisher":{"@id":"https:\/\/login-master.com\/#organization"},"image":{"@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg","articleSection":["Digitalisation","IAM","News","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/","url":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/","name":"Cyber risk orphaned user accounts","isPartOf":{"@id":"https:\/\/login-master.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage"},"image":{"@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg","datePublished":"2025-03-13T09:44:47+00:00","dateModified":"2025-03-13T09:57:12+00:00","description":"Unused user accounts are a major cyber risk. Read here to find out how this can happen and how to increase cyber security.","breadcrumb":{"@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#primaryimage","url":"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg","contentUrl":"https:\/\/login-master.com\/wp-content\/uploads\/2022\/11\/L_77a0700-AS-scaled.jpg","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/login-master.com\/en\/the-cyber-risk-due-to-orphaned-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/login-master.com\/"},{"@type":"ListItem","position":2,"name":"The cyber risk of orphaned accounts &#8211; an interview with Stephanie Ta"}]},{"@type":"WebSite","@id":"https:\/\/login-master.com\/#website","url":"https:\/\/login-master.com\/","name":"Login Master","description":"Identity-Access-Management for web applications and services","publisher":{"@id":"https:\/\/login-master.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/login-master.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/login-master.com\/#organization","name":"Login-master","url":"https:\/\/login-master.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/login-master.com\/#\/schema\/logo\/image\/","url":"https:\/\/login-master.com\/wp-content\/uploads\/2021\/04\/logo-login-master-500x200-opt.png","contentUrl":"https:\/\/login-master.com\/wp-content\/uploads\/2021\/04\/logo-login-master-500x200-opt.png","width":500,"height":200,"caption":"Login-master"},"image":{"@id":"https:\/\/login-master.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/syntlogo.die.iam.experten","https:\/\/de.linkedin.com\/company\/syntlogo-gmbh","https:\/\/de.linkedin.com\/company\/intension"]},{"@type":"Person","@id":"https:\/\/login-master.com\/#\/schema\/person\/73122369d6589f3c732ba3ce7b7057d2","name":"Stephanie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/58735c4344d4449c95ccfb596a075ce5306761270cec3fbea294181e41d0be4d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/58735c4344d4449c95ccfb596a075ce5306761270cec3fbea294181e41d0be4d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58735c4344d4449c95ccfb596a075ce5306761270cec3fbea294181e41d0be4d?s=96&d=mm&r=g","caption":"Stephanie"},"url":"https:\/\/login-master.com\/en\/author\/stephanie\/"}]}},"_links":{"self":[{"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/posts\/8266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/comments?post=8266"}],"version-history":[{"count":3,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/posts\/8266\/revisions"}],"predecessor-version":[{"id":8269,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/posts\/8266\/revisions\/8269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/media\/6786"}],"wp:attachment":[{"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/media?parent=8266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/categories?post=8266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/login-master.com\/en\/wp-json\/wp\/v2\/tags?post=8266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}