Onboarding new employees and ensuring they have access to everything they need takes a lot of time for many firms. However, the offboarding process often does not receive the same attention. A company runs a severe risk if access and permissions are not appropriately suspended when an employee quits abruptly, or a contractor is no longer needed. Offboarding and deactivating a user’s identification can be tedious and time-consuming. Still, it is also often highly time-sensitive and necessitates IT admins to be available at all times. This article at InformationWeek by Nathan Eddy shares the best practices for employee offboarding.
Automating Employee Offboarding
Torii’s co-founder and CEO, Uri Haramati, explains that compliance, legal, IT security, and HR departments must collaborate to create an effective offboarding strategy. The IT department is responsible for automating, securing, and building trustworthy processes. He claims that IT leaders are best positioned to identify cybersecurity issues regarding SaaS.
“They need visibility into all SaaS app usage and users and a way to integrate offboarding with HR systems to trigger deprovisioning from all apps when employees, contractors, and interns leave their positions or end their engagement with the company,” he says.
IT Leaders’ Role in Secure Employee Offboarding
IT security executives are crucial in developing a secure offboarding policy, believes Darryl MacLeod, vCISO of information security consulting firm LARES Consulting. According to MacLeod, IT leaders oversee comprehending the hazards connected to inappropriate offboarding and creating procedures to reduce those risks by implementing security standards.
He acknowledges that the procedure can be difficult and time-consuming and that many businesses lack the proper tools or knowledge to execute a secure offboarding program. Top cyber hazards from improper employee offboarding include the possibility that they would still have access to company networks and data. This might result in data breaches and harm the firm’s reputation. Other dangers include potential fraud, cybercrime, social engineering, or phishing attacks.
In addition, the author discusses how workforce decentralization increases offboarding complexity and automation, deprovisioning key offboarding tools.
To read the original article, click on https://www.informationweek.com/security-and-risk-strategy/offboarding-staff-securely-best-practices-in-the-extended-workforce-era