Is Your Network Secure from Ex-Employees?

Is Your Network Secure from Ex-Employees?

Is your network secure from ex-employees?  When someone leaves your company, how do you remove their access to your business data? Particularly with mobile devices, an ex-employee may have emails and contact information on a smartphone that may belong to them, not you.

Take these steps to make sure former employees can’t access your network.

Technology Use Policies

If you don’t have Technology Use Policies in place, make it a priority to create them.  They are designed to protect you, your business and your employees.

Technology Use Policies don’t need to be heavy-handed.  They should be clear and reasonable so employees understand what’s acceptable at work.  Policies also protect you and your business in the event of employee misconduct.

Here are a few questions your policies should address:

  • Do your employees assume that they have privacy when using a computer at work?  What’s your expectation?  The courts have been mixed on this, but generally speaking, employees should not have an expectation of personal privacy when using company resources, particularly email.
  • Do your employees have a clear understanding of which company information is confidential?  With policies in place, you minimize your risk and have a basis for recourse if a disgruntled employee shares information that could damage morale or negatively affect you in the marketplace.
  • Will you allow employees to download games or other non-business applications to your network? (We advise against it.)
  • Can employees make personal calls on their company cell phone?  What about shopping online using the company computer?
  • If employees use their own device such as a smartphone, are they allowed to access your company network?  When they leave the company, what happens to your company data?  Decide what’s best for your company and include it in your policies.
  • Does everyone have access to the Internet?  Do you want them to be able to access any site on a company computer?  What activities are prohibited?

Clearly communicating expectations will help everyone understand what happens from a technology standpoint when an employee leaves.

Passwords and Services

Depending on your IT environment, here are some of the steps you or your IT team will need to take to secure your network when an employee leaves:

  • Disable the user’s account on the network and change the password.
  • Forward the user’s email account to someone else in the company and change the password.
  • If your employees use personal smartphones with company email access, disconnect the smartphone from the company email account. We suggest the user removes the account in front of the exit interviewer during the exit interview.
  • Disable any third party application accounts, including those in the cloud, and change the passwords.
  • Remove any VPN access from the user to disable remote access.
  • If the user has anyone else’s passwords in the company, change those passwords.
  • If the user has the local WiFi password, that should be changed.  Your IT administrator should handle this.

With Technology Use Policies and help from a skilled tech team, you can be confident your network is secure from ex-employees.

If your business needs help managing IT, contact CRU Solutions.