Every organisation that outsources operational work to a BPO, MSP, or shared service provider eventually asks
the same question: “How do you prevent your staff from sharing or selling access to our
systems?” It is being asked in contract renewals, security audits, and procurement reviews in every
major sector — financial services, healthcare, government, retail. The answer currently available to most
outsourced operations is a policy answer: acceptable use agreements, training, monitoring. That answer is no
longer sufficient.
The question has a structural answer now. MyCena means your agents never hold a credential to share
or sell. The credential is generated centrally, injected invisibly at login, and revoked in seconds
when an agent leaves or a client relationship ends. The answer to the client’s question becomes architectural,
not procedural — and that distinction is the difference between winning and losing the audit conversation.
Kaseya — 2021
1,500
MSP technician credentials compromised. 1,500 downstream client environments
encrypted simultaneously. Every client relationship at risk from one set of credentials.
Operational consequence: simultaneous client impact at scale
BPO credential sale — recurring
£50–500
Agent sells banking portal credentials on dark web. BPO faces client penalty,
regulatory investigation, and contract termination worth orders of magnitude more. Agent carries almost none
of the downside.
Operational consequence: contract loss, regulatory exposure
Stale access — industry-wide
72 hrs
Average time for a departed agent’s credentials to remain active after offboarding
in manual deprovisioning environments. Every hour is a contractual and regulatory liability window.
Operational consequence: SLA breach, audit finding, client escalation