Is Your Network Secure from Ex-Employees?
- Post by Janet Gehring
- March 17, 2016
When an employee leaves your company, how do you also make sure their access to your business data is terminated? Particularly with mobile devices, an ex-employee may have emails and contact information on a smartphone that may belong to them, not you.
To help manage your business IT, here are some steps you can take to make sure your network is secure from access by ex-employees.
If you don’t have Technology Use Policies in place, make it a priority to create them. They are designed to protect you, your business and your employees.
Technology Use Policies don’t need to be heavy-handed. They should be clear and reasonable so that employees understand what’s acceptable at work and also protect you and your business in the event of employee misconduct.
To get you started, here are a few questions your policies should address:
Addressing these questions and clearly communicating expectations will help everyone in your company understand what happens from a technology standpoint when an employee leaves.
Depending on your IT environment, there are a number of steps you or your IT team will need to take to secure your network when an employee leaves:
With Technology Use Policies in place and help with your IT from a skilled tech team, you can help ensure that former employees cannot gain access to information they should no longer have.
If your business needs help managing IT, contact CRU Solutions.