The State of Tech | Technology Insights

Identity & access: who can see what and why it gets messy

Written by Nathan | 04-Apr-2026 06:25:07

Identity and access: who can log in, what they can see, and why it gets messy

In most SMBs, access to systems grows organically, which means people are given logins when they need them and those logins tend to stick around long after circumstances change. At first, this feels efficient. Work carries on, nobody is blocked, and the business moves quickly. Over time, though, this approach creates a web of permissions that nobody fully understands anymore. The issue isn’t that access is badly intentioned. It’s that identity and access tend to sit in the background, quietly expanding as teams grow, contractors come and go, and new tools are added. Because nothing breaks immediately, the risk stays invisible until the day it really matters. This article looks at why access control gets messy in SMBs, what the real risks are, and how to tighten things up without turning it into a bureaucratic exercise.

What identity and access actually mean in practice

Identity is simply how a system knows who someone is, which usually means an account tied to an email address. Access is what that identity is allowed to do once they’re logged in, which means what data they can see, change or share. In a small team, this is often handled informally. People get access because they’re trusted, and permissions are widened rather than narrowed because it’s quicker. That works when everyone knows everyone and systems are limited. As soon as the business grows, that informal approach starts to strain. More systems are added, roles become more specialised, and external people need temporary access. Without structure, access decisions pile up without being revisited, which means yesterday’s needs quietly become today’s exposure.

Why access sprawl happens so easily

Access sprawl isn’t usually caused by poor decisions. It’s caused by sensible decisions made in isolation. Someone needs quick access to help with a task, so permissions are granted. A contractor needs to log in for a few weeks, so an account is created. A role changes, but access isn’t reviewed because nothing obvious forces the conversation. Each decision makes sense on its own. The problem is that very few of them are reversed. Over time, this creates a situation where people have access they no longer need, and sometimes access they shouldn’t have at all. This is made worse by shared accounts, which are still common in SMBs. When multiple people log in as the same user, accountability disappears, and removing access becomes far more difficult because it affects more than one person.

The real risks aren’t always obvious

When people think about access risk, they often picture malicious behaviour, which means a disgruntled employee or an external attacker. In reality, most access-related incidents are accidental. Someone opens or shares the wrong file. A former employee still has access to a system months after leaving. A supplier can see more information than intended because their account was never restricted properly. These issues rarely make headlines, but they create real problems, especially where personal or commercial data is involved. From a UK perspective, this also links directly to data protection responsibilities. If personal data is accessed by someone who shouldn’t have it, intent doesn’t matter. The business is still accountable, which means access control is not just an IT concern, it’s a governance one.

Joiners and leavers are where cracks show first

Access problems are most visible during change. When someone joins, they often need multiple systems set up quickly, which means access is granted rapidly and sometimes generously. When someone leaves, access should be removed just as quickly, but this is where things often fall down. If access is spread across many tools, and ownership of those tools isn’t clear, it’s easy to miss something. An email account might be disabled, but access to a file sharing system or third-party app might remain active. Over time, these gaps accumulate. A clear joiner and leaver process reduces this risk significantly. It doesn’t need to be complex. It just needs to exist, be documented, and be followed consistently.

Why shared accounts make everything harder

Shared accounts feel convenient, especially for finance, operations or generic inboxes, but they create several problems at once. There’s no clear record of who did what, passwords get shared in insecure ways, and removing access becomes disruptive because it affects multiple people. They also make security controls less effective. Many modern protections rely on linking actions to individuals, which means shared accounts weaken monitoring and increase risk. Where shared access is genuinely needed, it’s usually better handled through individual accounts with shared permissions, rather than a single login. This keeps accountability intact while still allowing collaboration.

Role-based access keeps things manageable

One of the simplest ways to regain control is to think in terms of roles rather than individuals. Instead of deciding access one person at a time, SMBs can define a small number of role profiles that reflect how the business actually works. For example, a finance role might need access to accounting systems and certain files, while a sales role might need access to CRM and shared documents. Not everyone needs everything, and acknowledging that reduces both risk and clutter. When roles are clear, access becomes easier to grant and easier to review. New starters can be set up consistently, and changes are easier to manage when someone moves roles internally.

Access reviews don’t need to be painful

Access reviews sound formal, which is why many SMBs avoid them, but in practice they can be very lightweight. The goal isn’t to audit every permission in detail. It’s to sanity check who has access to what and whether it still makes sense. Even a quarterly or twice-yearly review can catch obvious issues, such as accounts that shouldn’t exist or access that no longer fits a role. These reviews are especially useful for systems that hold sensitive or business-critical data. The key is to make reviews routine rather than reactive. When they only happen after an incident, they feel punitive. When they’re part of normal operations, they feel sensible.

Identity becomes the control point as systems multiply

As SMBs adopt more cloud tools, identity becomes the common thread that ties everything together. Rather than managing access separately in every system, linking access to a central identity makes control far easier. When access is tied to a single account, disabling that account removes access everywhere at once, which dramatically reduces the risk of something being missed. It also simplifies life for staff, because they have fewer logins to manage. This approach works best when combined with clear ownership of systems and an understanding of which tools really matter to the business.

Balancing control with day-to-day reality

One of the reasons access control is often left loose is fear of slowing people down. SMBs value agility, and overly strict rules can create friction. The aim isn’t to lock everything down, it’s to be deliberate. Good access control supports work rather than blocking it. People have what they need, when they need it, and no more than that. When something changes, access changes with it. This balance comes from clarity rather than complexity. When expectations are clear and processes are simple, control feels like support rather than restriction.

When access stops being a guessing game

When identity and access are handled well, they fade into the background. People can log in and do their jobs, leavers don’t leave loose ends behind, and the business has a clearer view of its exposure. For SMBs, the goal isn’t perfection. It’s reducing the number of unknowns. Knowing who can access what, and why, removes a layer of risk that often goes unnoticed until it’s too late. Access will always change as the business changes. The difference is whether those changes are intentional or accidental, and that’s where a bit of structure makes a disproportionate difference.