Employment transition is an often overlooked danger to company security. Whether it's massive layoffs or routine separations, IT should have standard security policies in place that detail the steps to take when an employee leaves the company. In this IT Dojo video, I'll go over four critical areas of employment transition security, including:
- User accounts
- Personal electronics
And because dismissals and departures can be traumatic for everyone involved, I recommend you read William Jones', article "Sensitive tech support during employee departures." Here, Jones outlines several ways that IT departments can humanely serve both the employee and the company during a staff member's exit.
For those of you who prefer text to video, you can click the Transcript link that appears below the video player window or you can also read Chad Perrin's article, "10 important categories of employment transition security," on which this video is based.
You can also sign up to receive the latest IT Dojo lessons through one or more of the following methods:
Bill Detwiler has nothing to disclose. He doesn't hold investments in the technology companies he covers.
Bill Detwiler is Managing Editor of TechRepublic and Tech Pro Research and the host of Cracking Open, CNET and TechRepublic's popular online show. Prior to joining TechRepublic in 2000, Bill was an IT manager, database administrator, and desktop support specialist in the social research and energy industries. He has bachelor's and master's degrees from the University of Louisville, where he has also lectured on computer crime and crime prevention.