![]() ![]() To help prevent other organizations from facing similar situations, Taparia and other experts outlined the following best practices for keeping company information and hardware secure in the event of an employee leaving. Neal Taparia, co-founder of SOTA Partners, said he once experienced an employee send themselves sensitive business information upon figuring out their employment would be terminated. SEE: Checklist: Employee Termination (TechRepublic Premium) “When an employee is terminated or informs the organization they are leaving for another company, there must be a way for an IT manager to immediately revoke the employee’s access.” “The only way to secure critical business data is to control the access to it,” Kothanath said. ![]() While equipping employees with secure connections is one of the crucial first steps to launching a remote workforce, businesses must also consider how to rescind such access upon employee termination or departure. “This requires organizations to rapidly roll out VPNs and authentication technologies, such as multi-factor authentication, while enabling employees to be able to connect to mission-critical assets from their remote workstations.” “Organizations are frantically trying to enable existing workforces to become full-time remote workforces,” said Arun Kothanath, chief security strategist at Clango, an identity and access management (IAM) consultancy. SEE: Coronavirus: Critical IT policies and tools every business needs (TechRepublic Premium)Ĭompanies have been forced to quickly adapt to remote work because of the coronavirus, many of which have never worked entirely remotely previously. No matter the reason, companies must have the proper plans and security in place for an employee’s departure. ![]() Some employees, however, are also opting to leave their jobs during this chaotic time. With COVID-19 shaking up employment, many teams are facing furloughs and layoffs. IT management software: The ultimate buyer’s guideĬISOs are taking on more responsibilities - and burning out How to recruit and hire an Operations Research AnalystĢ022 tech conferences and events to add to your calendar ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |