{"id":1064,"date":"2016-04-21T08:00:45","date_gmt":"2016-04-21T12:00:45","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1064"},"modified":"2021-10-29T00:44:57","modified_gmt":"2021-10-29T04:44:57","slug":"an-it-perspective-to-mitigating-risk-during-an-employee-dismissal","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1064","title":{"rendered":"IT Security Best Practices for Offboarding: Mitigating Risk During an Employee Dismissal"},"content":{"rendered":"<p>Terminating employees is\u00a0one of the most unpleasant aspects of managing people, learn how to properly plan and prepare for a dismissal from an IT standpoint&#8230;<\/p>\n<p>You will likely never meet a business owner or supervisor who actually enjoys dismissing an employee. Unfortunately, there are times when it is absolutely necessary.\u00a0 Understandably, being let go can be very emotional. \u00a0For this reason, a former employee who still has access to a company\u2019s network and proprietary data can present huge security risks. \u00a0It is important to\u00a0partner with your IT provider and\u00a0properly remove them from the network.\u00a0 Here are some tips to managing this very difficult situation:<!--more--><\/p>\n<p><span style=\"color: #800000;\"><strong>Be Proactive:<\/strong><\/span><\/p>\n<p>Early preparation can allow your IT team to preserve critical resources, data, and activity logs in the event the former employee decides to seek retribution through damaging company resources. Have a discussion with your IT provider about creating a termination policy that could include data redundancy and retention policies which provide some protection should the employee preemptively delete their hard drive.<\/p>\n<p><span style=\"color: #800000;\"><strong>Communication and Plan:<\/strong><\/span><\/p>\n<p>The best preparation can go awry if all parties are not kept in the loop.\u00a0 Take Twitter as an <strong><a href=\"http:\/\/www.forbes.com\/sites\/abigailtracy\/2015\/10\/13\/twitter-employees-learn-theyre-laid-off-via-email-lockout-tweet-suggests\/#4227b8b77f60\" target=\"_blank\" rel=\"noopener noreferrer\">example<\/a><\/strong>, their employees woke up one morning to learn they were laid off because their mobile accounts were disabled prematurely.\u00a0 Maintaining a clear line of communication could have alleviated the risk of escalating\u00a0an already sensitive situation.\u00a0 Luckily for Twitter, they hadn\u2019t informed employees of layoffs before they coordinated between their HR and IT department, enabling disgruntled employees the ability to wreak havoc on their network. What Twitter did lose, was control over the outcome, and the conditions in which each case would be managed.<\/p>\n<p>It is worth noting that these situations can create hostility.\u00a0 According to the <strong><a href=\"http:\/\/www.ic3.gov\/media\/2014\/140923.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Department of Homeland Security<\/a><\/strong>, there\u00a0have\u00a0been a dramatic increase in the number of computer network infiltrations by former employees; they pose a significant threat to US businesses due to their authorized access to sensitive information and networks that businesses rely on.<\/p>\n<p>It is why having a formal dismissal protocol which can alert your IT team to revoke access to the company computer, network, and data is so important.\u00a0 This includes remote access so that they cannot login from their home or personal mobile devices.<\/p>\n<p><span style=\"color: #800000;\"><strong>Retrieve Company Property:<\/strong><\/span><\/p>\n<p>Removing access from the network is an important safeguard to your existing infrastructure.\u00a0 However, it is also important to take possession of all company property immediately following dismissal.\u00a0 Items such as company laptops, mobile devices, access cards, and corporate credit cards are all crucial to keeping your property safe.\u00a0 This is also where the value of an established <strong><a href=\"http:\/\/www.mass.gov\/ocabr\/docs\/idtheft\/sec-plan-smallbiz-guide.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">WISP<\/a><\/strong> and <strong><a href=\"https:\/\/tsisupport.com\/tsistaging\/4-tips-for-a-strong-byod-policy\/\">BYOD plan<\/a><\/strong> comes into play so any device &#8211; either commissioned or employee owned &#8211; can be managed to protect company assets.<\/p>\n<p>All items and revocations should be documented similarly to\u00a0the process of a new hire &#8211; in the event of a legal dispute these records will become vital.\u00a0 In addition to a BYOD plan, your organization should also have a WISP that provides a degree of protection for the employer in case of litigation as well as setting internal expectations for using devices that access company data.<\/p>\n<p><span style=\"color: #800000;\"><strong>Final Thoughts:<\/strong><\/span><\/p>\n<p>Dismissing an employee is one of the most difficult tasks you\u2019ll ever have to do; and for most, it is a painful responsibility which never gets easier.\u00a0 Fortunately, it is something you do not need to go through alone. With the help of a proper HR professional to guide you through the process, and a clear IT employee dismissal process, you will have the tools to tackle the situation while minimizing risk to your business.\u00a0 For more information on how to develop an internal company policy or learn more about the ways to protect your business, <strong><a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">contact us<\/a><\/strong>\u00a0today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Terminating employees is one of the most unpleasant aspects of managing people, learn how to properly plan and prepare for a dismissal from an IT standpoint&#8230;<\/p>\n","protected":false},"author":2,"featured_media":8395,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[12],"tags":[196,197,198,199,194,200,177,169,201],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Mitigate Risk During an Employee Dismissal | TSI<\/title>\n<meta name=\"description\" content=\"Learn how you can mitigate risk during already complicated employee dismissals by following TSI&#039;s expert IT security best practices for SMBs.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Mitigate Risk During an Employee Dismissal | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn how you can mitigate risk during already complicated employee dismissals by following TSI&#039;s expert IT security best practices for SMBs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1064\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-21T12:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-29T04:44:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064\",\"name\":\"How to Mitigate Risk During an Employee Dismissal | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png\",\"datePublished\":\"2016-04-21T12:00:45+00:00\",\"dateModified\":\"2021-10-29T04:44:57+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn how you can mitigate risk during already complicated employee dismissals by following TSI's expert IT security best practices for SMBs.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1064\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png\",\"width\":1024,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1064#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Best Practices for Offboarding: Mitigating Risk During an Employee Dismissal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Mitigate Risk During an Employee Dismissal | TSI","description":"Learn how you can mitigate risk during already complicated employee dismissals by following TSI's expert IT security best practices for SMBs.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Mitigate Risk During an Employee Dismissal | TSI","og_description":"Learn how you can mitigate risk during already complicated employee dismissals by following TSI's expert IT security best practices for SMBs.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1064","og_site_name":"TSI Support","article_published_time":"2016-04-21T12:00:45+00:00","article_modified_time":"2021-10-29T04:44:57+00:00","og_image":[{"width":1024,"height":341,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1064","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1064","name":"How to Mitigate Risk During an Employee Dismissal | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1064#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1064#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png","datePublished":"2016-04-21T12:00:45+00:00","dateModified":"2021-10-29T04:44:57+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn how you can mitigate risk during already complicated employee dismissals by following TSI's expert IT security best practices for SMBs.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1064#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1064"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1064#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/04\/MitigatingRisk.fw_-1140x380-1.png","width":1024,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1064#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"IT Security Best Practices for Offboarding: Mitigating Risk During an Employee Dismissal"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1064"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1064"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8395"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}