Central Monitoring News

Archive for the ‘Business Safety’ Category

Terminating Employees Can Lead to a Breach in Company Security

Posted by Central Monitoring Services, Inc. on June 20, 2014

Business SecurityEmployers work hard to hire the right person for the job. However, sometimes an employee still isn’t the right fit and the employer must make the difficult decision to terminate him or her. Managers and business owners should understand how an employee’s departure poses a security risk for their companies, what precautions to take, and how to set up and apply a termination process.

Why Staff Leave
Some employees will leave a company understanding why they were let go. For example, layoffs are difficult but often necessary if a business is struggling. Some people may feel upset and feel that other people should have been let go before them. Fired employees may feel vindictive or out for revenge. When this happens, they may try to get back at the manager or the company that terminated them.

Focus on Business Facilities
When staff members are let go, it’s time to start changing all of the security codes allowing access to the premises. Experts in the security world recommend that these items should be changed on a regular basis but should be done immediately when an employee is terminated. If a former staff member does return to the office, it is important that managers and proper personnel are notified. Employees can of course collect their personal belongings, but this should be monitored so other items are not accessed.

Swipe Cards
Many businesses forget to collect employees’ swipe cards or forget that a person may have more than one. When a staff member is let go, it is important to take these items back or to update the building’s security codes so they can no longer get into the building or access important areas. This doesn’t take much time but is an important step.

Cloud Computing Access
Cloud technology has become more popular over the years because it allows people the chance to access information no matter where they are. For example, many businesses use DropBox or GoogleDocs so that staff can collaborate on projects or share important files. With the right business security systems, business owners and managers can limit access to these files and prevent harmful breaches. Access can be limited or removed very quickly, even when people are not in the office. This keeps the cloud secure and ensures that important data is not shared with the wrong people.

The best way to stay on top of business security systems is to act quickly when staff members are let go or terminated. Having the right policies and protocol in place protects the business so that important passcodes, data, files, projects and more are not accessed or shared. All it takes is one scorned or vindictive former staff member to really affect the livelihood of an organization. Paying attention to security prevents issues from arising. Otherwise, this could be a costly mistake.

Posted in Business Safety | Tagged: | Leave a Comment »