11:13 AM
Keith Ferrell
Keith Ferrell
Connect Directly
Repost This

When Employees Leave, Make Sure They're Gone

Employee resignations and layoffs raise questions about network security and data security. Here are 7 ways to protect your small or midsize business

Employee departures, voluntary or otherwise, are a fact of business life.

In our digital, networked, connected age, they're a fact of e-business security, too.

Used to be, not all that long ago, that when an employee gave notice, you'd work out a departure date, arrange to collect keys, ID cards, final expense reports, and various other materials. Maybe you'd do an exit interview, maybe not; same for a goodbye party.

In the case of terminated employees you'd accelerate the process, collecting all relevant materials immediately, escorting the employee from the premises, goodbye party not likely.

What a difference a digital revolution makes! Today, an employee resignation -- or layoff -- raises countless questions of company, customer, and co-worker network, computer, and information security. Termination-for-cause raises those same questions, in spades.

And if the departing employee -- whatever the reason for the departure -- was involved directly in your company's IT management or operations, the issues and potential threats grow exponentially. While we all want to believe that our employees, colleagues, and co-workers are as honest and trustworthy as we are, we all also have to face facts. Even as organized crime makes larger and larger inroads into cybercrime, the insider -- and former insider -- threat to your data and network security remains immense.

A moment's thought will give you a good sense of what you're up against should your company be insufficiently insulated against disgruntled or criminally motivated former employees:

  • Still-active passwords and network access
  • Stolen -- or unrecovered -- customer information and e-mailing lists
  • Backdoors that allow illicit entry into the network
  • Logic bombs and other sabotage-ware planted before departure

Any one of these can be enough to wreak havoc on your business, and your customers' confidence in your business security.

While there's no 100% foolproof solution to preventing a former employee from taking digital revenge, there are a number of solid security, management, and just plain commonsense tools and policies you can put in place to reduce your risk.

1. Make policy.
One key is a solid, detailed, signed, and enforced security policy. Clearly, an employee bent on stealing data or sabotaging your operations isn't likely to be deterred by signing a policy form, but the form a) sends a message throughout the company that you're serious about security policy and b) can help deter an "on the edge of temptation" employee.

2. Know who knows, and know what they know.
Equally important is centralizing not only password and network access management, but also keeping a constant and constantly updated inventory of who has access to what. In addition to minimizing unauthorized and unnecessary access to critical, confidential, and private information, you'll also have a good idea of which employees with access could have made copies of that material. This can be important in the case of terminations.

3. Pink slips can equal data slips.
If you're planning a termination for cause, keep it to yourself and the very fewest number of employees and co-workers possible. Any advance warning gives the soon-to-be-gone employee the chance to plant the seeds of a cybertheft or act of sabotage.

In the same "No, d'uh" department, should a larger or company-wide layoff be looming, keep it quiet. Odds are your employees already will be passing scuttlebutt based on business conditions and general company demeanor. Don't heighten their anxieties by signaling the cutbacks in advance. Employees who know their jobs are a goner may be tempted to take your data security with them.

1 of 2
Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.