C-level executives commonly present a unique combination of advanced permissions, mobility requirements and public personae that intensify the need to defend traditional attack surfaces. Therefore, it’s important adopt a deliberate, standalone checklist to eliminate errors and best position new executives for productivity and success while also securing the firm’s data when they leave.
IT departments should consider creating and following a checklist, like the example provided by TechRepublic Premium. Note, it’s important when deploying a checklist to include standard steps used to accommodate regular employees as well as multiple additional custom responsibilities that must be completed whenever onboarding or offboarding a C-level executive or other senior level post. Only by carefully tracking these additional privileges can IT departments ensure that key details associated with a corresponding C-suite change are properly addressed.