(281) 816-6430    Get SUPPORT

SouthBridge Consulting Blog

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

The Walking, Talking Dead
Unfortunately, employees sometimes do things that force a business owner or manager to terminate his/her employment contract. Other employees leave if they have problems with management or find better opportunities elsewhere. Unfortunately for the business, a clean break may not be possible, and a disgruntled former employee can make things extremely difficult for your business.

One way that a former employee can virtually haunt your business is through the use of social media. If it was a rough break, a former employee can slander your business on social networks such as Facebook and Twitter, as well as social media designed for employer reviews like LinkedIn and the anonymous review site, Glassdoor. This may be nothing more than a hindrance, and typically no one is going to pay a solitary source much mind, but if multiple complaints of the same nature start popping up on social media, you might spook the high-end talent out of considering working with your business.

Residing Evil
Another way former employees can hurt your business, is if you let them. When they leave, you have to remember to ensure that any account authorization they had access to is deleted. There have been cases where former employees will make their way onto their former company’s infrastructure or network and corrupt things, either manually or with the help of malware.

Typically, those who would go ahead and effectively hack their former employers’ systems, know what they are looking for, and use this access to make it more difficult for a company’s business to run efficiently. As long as your IT administrators have a plan on how to remove former users and do so immediately after the employee is let go, this may not be much of an issue.

Some former employees have deliberately built in a way into a network away from the procedural protocols outlined by IT administrators. In these cases, a full network audit is necessary to ensure that any trace of the worker is removed promptly. Any other result keeps the potential for jaded former employees to do some pretty disgusting things to your company’s network.

Trick or Treating
While some former employees want to take it out on their former employer, some former employees will want to steal company data, client data, or intellectual property. In fact, in one study done by security experts Symantec, data showed that nearly half of all fired employees had kept some sort of confidential corporate information. While this may not be a massive deal, 40 percent of them planned on using that data at a new job.

While organizations may not be able to completely avoid this from happening, there are some courses of action that can be taken to ensure that this data isn’t used against their own company. Make every employee sign, and enforce, a non-compete agreement, while also utilizing access control systems to ensure the people who don’t need certain information, don’t have access to said information. Giving people fewer chances to make off with data is a great way to keep people from taking it in the first place.

Business can be scary sometimes, and the last thing you need is for your bottom line to be hacked and slashed because of your former employees. At SouthBridge Consulting, we can help you protect your data and network from all manners of threats; and; help make sure that former employees don’t haunt you long after their gone. To learn exactly how we can help you, call us today at (281) 816-6430.

4 Backup and Recovery Terms You Should Understand
Uber Demonstrates the Importance of Disclosing a D...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Tech Term Internet Data Business Computing Privacy Business Hosted Solutions Email IT Services IT Support Cloud Malware Network Security Data Backup Cloud Computing Hackers Efficiency Business Management Small Business Paperless Office Software Windows 10 Innovation Google Hardware Android Mobile Devices Server Encryption Computer Communication Collaboration Workplace Tips Managed IT Services Upgrade Outsourced IT Passwords Data Recovery Ransomware Browser Managed Service Office 365 Government User Tips Artificial Intelligence VoIP Holiday Microsoft Business Technology Blockchain Information Bandwidth Website Scam Employer-Employee Relationship Quick Tips Saving Money Smartphones BYOD Chrome Healthcare Infrastructure Wi-Fi Communications Two-factor Authentication Document Management Phishing Applications Vulnerability Business Continuity Managed IT services Machine Learning IT Management Cybersecurity RMM Internet of Things Managed Service Provider Maintenance Microsoft Office Data Management Router Cooperation Tablet Storage Gmail Smartphone Backup Remote Monitoring HIPAA VPN Social Media Mobile Device Automation Antivirus Mobile Security Bring Your Own Device Access Control Network Compliance Management Wires Finance Windows 7 Augmented Reality Hotspot Point of Sale Theft 5G Manufacturing Tech Support BDR G Suite Bookmarks Wasting Time Apps SharePoint Data Security Star Wars Zero-Day Threat Black Friday Licensing Regulations Company Culture Files Notes App Facebook Analytics The Internet of Things Mouse Language Chatbots Network Management E-Commerce Financial Dark Web Google Calendar Permissions Monitoring Electronic Medical Records Hard Disk Drives Gadgets Distributed Denial of Service Chromebook Favorites Windows Downloads Cost Management OneNote Human Error Teamwork Customer Relationship Management Cyber Monday Data loss Managing Stress Read Only PowerPoint Wearable Technology Screen Reader Authentication Networking Identity Theft Recycling Save Money Social Operating System Solid State Drives Users Managed IT Service Modem Vulnerabilities Politics Database Multi-Factor Security IT Technicians How To Permission Shared resources Customer Service Staff Disaster Recovery Enterprise Content Management Professional Services Printer Money Smart Tech Authorization Settings Computing Computing Infrastructure Identity eWaste Features Security Cameras Voice over Internet Protocol Legislation Fraud Hard Drive Consulting Downtime Options Virtualization Break Fix Virtual Reality Cookies Development Wireless Server Management Assessment Employee-Employer Relationship Test File Sharing Spam Smart Technology Social Networking Unified Communications Help Desk Vendor Management Mobile Device Management Microsoft Excel Connectivity Employees Transportation Comparison Alerts Patch Management Private Cloud Instant Messaging Net Neutrality Remote Computing Cache Managed Services Provider Tech Terms Wireless Internet Nanotechnology Cables Risk Management Mirgation Internet Exlporer Remote Workers OneDrive Firewall Motherboard Office IoT Remote Monitoring and Management Specifications Electronic Health Records ROI Cortana Wireless Technology Safety Students IBM Criminal Justice Productivity Marketing Hacker Alert Budget Hiring/Firing Competition Big Data Fun IP Address Twitter Miscellaneous Printers Mobile Office Domains Hard Drives Regulation Windows 10 Search Public Speaking Presentation Lithium-ion battery Education