Is Your Network Secure from Ex-Employees?
- Post by Janet Gehring
- October 4, 2019
Is your network secure from ex-employees? When someone leaves your company, how do you remove their access to your business data? Particularly with mobile devices, an ex-employee may have emails and contact information on a smartphone that may belong to them, not you.
Take these steps to make sure former employees can’t access your network.
If you don’t have Technology Use Policies in place, make it a priority to create them. They are designed to protect you, your business and your employees.
Technology Use Policies don’t need to be heavy-handed. They should be clear and reasonable so employees understand what’s acceptable at work. Policies also protect you and your business in the event of employee misconduct.
Here are a few questions your policies should address:
Clearly communicating expectations will help everyone understand what happens from a technology standpoint when an employee leaves.
Depending on your IT environment, there are a number of steps you or your IT team will need to take to secure your network when an employee leaves:
With Technology Use Policies and help from a skilled tech team, you can be confident your network is secure from ex-employees.
If your business needs help managing IT, contact CRU Solutions.