Call 310-473-4422

Checklist for Better Digital Offboarding of Employees

Grant Ackerman • Nov 29, 2022

Checklist for Better Digital Offboarding of Employees

Digital footprints cover today's modern workplace. Employees begin making these the moment they're hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company.


When an employee decides to leave a company, there is an offboarding process that needs to happen. This process “decouples” the employee from the company’s technological assets and is vital to cybersecurity.


You don’t want a former employee to maliciously email all your customers from their work email. Sensitive files left on a former staffer’s computer could leak months later. 


20% of surveyed businesses have experienced a data breach connected to a former employee.

 

Digital offboarding entails revoking privileges to company data, and much more. This is a critical process to go through for each former staff member to reduce risk.


Below, we’ve provided a handy checklist to help you cover all your bases.


Your Digital Offboarding Checklist

1. Knowledge Transfer

Vast swaths of corporate knowledge can disappear when a person leaves an organization. It’s important to capture this during a digital offboarding process.


This could be something as simple as what social media app someone used for company posts. Or it may be productivity leveraging. Such as the best way to enter the sales data into the CRM.


Make sure to do a knowledge download with an employee during the exit interview. Better yet, have all staff regularly document procedures and workflows. This makes the knowledge available if the employee is ever not there to perform those tasks.


2. Address Social Media Connections to the Company

Address any social media connections to the former employee. Is their personal Facebook user account an admin for your company's Facebook page? Do they post on your corporate LinkedIn page? Make sure to revoke the employee's access to any cooperate Social Media platforms.


4. Identify All Apps & Logins the Person Has Been Using for Work

Hopefully, your HR or IT department will have a list of all the apps and website logins that an employee has. But you can’t assume this. Employees often use unauthorized cloud apps to do their work. This is usually done without realizing the security consequences.


Make sure you know of any apps that the employee may have used for business activities. You will need to address these. Either change the login if you plan to continue using them. Or you may want to close them altogether after exporting company data.


5. Change Email Password

Changing the employee’s email password should be one of the first things you do. This keeps a former employee from getting company information. It also keeps them from emailing as a representative of the company.


Accounts are typically not closed immediately because emails need to be stored. But you should change the password to ensure the employee no longer has access.


6. Change Employee Passwords for Cloud Business Apps

Change all other app passwords. Remember that people often access business apps on personal devices. So, just because they can’t access their work computer any longer, doesn’t mean they can’t access their old accounts.


Changing the passwords locks them out no matter what device they are using. You can also simplify the process with a single sign-on solution.


7. Recover Any Company Devices

Make sure to recover any company-owned devices from the employee’s home. Remote employees are often issued equipment to use.


You should do this as soon as possible to avoid loss of the equipment. Once people no longer work for a company, they may sell, give away, or trash devices


8. Recover Data on Employee's Personal Devices

Many companies use a bring your own device (BYOD) policy. It saves them money, but this can make offboarding more difficult.


You need to ensure you’ve captured all company data from those devices. If you don’t already have a backup policy in place for this, now would be a good time to create one.


9. Transfer Data Ownership & Close Employee Accounts

Don’t keep old employee cloud accounts open indefinitely. Choose a user account to transfer their data to and then close the old account. Leaving unused employee accounts open is an invitation to a hacker. With no one monitoring the account, breaches can happen without anyone knowing. A criminal could gain access and steal data for months unnoticed. 


10. Revoke Access by Employee’s Devices to Your Apps and Network

Using an endpoint device management system, you can easily revoke device access. Remove the former employee’s device from any approved device list in your system.


11. Change Any Building Digital Passcodes

Don’t forget about physical access to your building. If you have any digital gate or door passcodes, be sure to change these so the person can no longer gain access.


12. Need Help Reducing Offboarding Security Risk?

When you proactively address digital offboarding, the process is easier and less risky. Contact us today for a free consultation to enhance your cybersecurity.

Contact Us

By Eduardo Velandia 19 Mar, 2024
STOP
28 Dec, 2023
Your Shield Against Insider Attacks
06 Dec, 2023
Password Managers
By Varant Tchalikian 30 Oct, 2023
Cyber Insurance
By Eduardo Velandia 28 Jun, 2023
In today's day in age, the use of AI-generated platforms has become increasingly popular across the internet. These platforms allow for a fast and facilitated way to complete tasks such as professional work, education, or expanding one's personal knowledge. Anyone has the ability to discover new or pre-existing information regarding a multitude of topics by simply imputing their inquiries on platforms such as Chat GPT. Chat GPT has had a striking impact on society because of how easy it is for people to gather information on any topic. The platform provides information on anything asked through its online chat and it does so with a fast response. However, Chat GPT and AI-generated platforms can have potential risks such as... Data Breaches Data breaches can happen when using any type of online platform, especially those generated by AI. Chat GPT must be accessed through a web browser since it cannot be downloaded. Because of that, data breaches can occur if an unauthorized party gets a hold of your online chat logs, personal information, or any other sensitive data. A few consequences are: Privacy compromises : If an unknown person or group gains access to your personal information through the platform, your privacy has been compromised and you identity could be exposed. Identity theft : Cybercriminals could use your personal information to act under your name rather than their own. They would steal your identity by using it against you in order to perform fraudulent actions. Misuse of data : User data could be subject to misuse when a data breach occurs on an AI platform. With that, your information could be used without your consent for suspicious activity online. Open AI appears to be taking accurate cyber security measures in order to make it less likely for data breaches to take place. However, not all systems are free from errors or breaches in security, and Chat GPT is a good example of this. Access to Confidential Information Chat GPT has the ability to use personal information entered into the online chat by its users. In order to ensure the user's safety and continual privacy while using the platform, it's best to not exploit one's own information when using the AI chat. Gaining access to user information isn't easy for an AI-generated platform to achieve, but if the user provides the data themselves, it can have some consequences. Biased or Inconsistent Information An additional risk in using Chat GPT is that it could potentially provide biased or inconsistent information to its users Because of the wide range of information the platform contains, it could possibly generate false data that could be confused for something else. This can definitely affect industries or companies that use AI-generated content for their line of work These businesses could provide faulty service to their customers all due to the misleading data given by an AI platform. This has the potential to hinder the company’s advances and overall performance as a result. In the end, it's up to the user and the user alone how they interpret the information given by the AI chat bots; it could be completely right or completely false. Question: Is it safe to use? In certain aspects, Chat GPT contains multiple potential threats to one’s online experience. A platform such as this one can provide misinformation and exploit your personal information. However, it can still be used without problems if certain measures are taken accordingly. Safety Measures You Can Take: Browse on and interacting with AI platforms through anonymous accounts Keep personal or sensitive information private Review the platform’s privacy policy and be well-informed about its activity To conclude, yes, Chat GPT is safe to use as long as it is used responsibly and accordingly to reap the benefits. These types of platforms will continue to be prevalent in the world for years to come and it’s important to know how to ensure we have the best experience with AI. Where can I learn more about the effects of AI for my business? At EV-Consultech, we can answer any questions or concerns you may have regarding the influence of AI. Learn more by contacting us below.
AI Chatbots
By Briana Alvarado 12 May, 2023
Why Using A.I. Chatbots Will Impact The Way You Conduct Business
By Andrea Velandia 04 Jan, 2023
Pandemic Impact
By Grant Ackerman 13 Oct, 2022
The pandemic has been a reality check that companies all around have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations had to quickly evolve to working through remote means.
6 Discontinued Technologies That Could Be Putting You At Risk
By Grant Ackerman 02 Sep, 2022
The one constant about technology is that it changes rapidly. Tools that were once industry standard, like Internet Explorer and Adobe Flash, age out, replaced by faster and more secure alternatives.
Windows Laptop
By Grant Ackerman 22 Aug, 2022
Microsoft 365 is much more than just Excel, Word, PowerPoint, and Outlook. Find out how this powerhouse platform is helping teams evolve in the new hybrid office business world.
More Posts
Share by: