THANK YOU FOR SUBSCRIBING
HR Tech Outlook | Tuesday, March 11, 2025
Failure to follow proper procedures during offboarding can lead to security issues, allowing cyber attackers to take advantage and damaging the company's reputation.
FREMONT, CA: The focus on onboarding is usually greater than offboarding, but from a security perspective, offboarding requires more attention. This process must be revised to avoid security vulnerabilities that cybercriminals can exploit. This article emphasizes the importance of offboarding and provides a seven-step guide for HR professionals to follow, ensuring the organization and its employees are protected from potential threats.
Keep track of internet traffic in the last week.
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
The leading cause of data leaks is often employees leaving a company. They may have duplicate files and information for future use, so the IT department needs to monitor their online activities and restrict access to sensitive data. Data Loss Prevention (DLP) tools are crucial for preventing unauthorized actions.
Coordinate with the IT Department
Corporate email compromises often happen when departments fail to share information, allowing cybercriminals to pose as former employees and send phishing emails to current employees. To prevent this, HR should immediately inform IT of any employee departures so they can take necessary security measures.
Announce Staffing Adjustments
Bridging the information gap between stakeholders is crucial in reducing risks. Notifying all staff and suppliers when an employee leaves the organization is important, but this step is often overlooked. Former employees may exploit their old roles for social engineering attacks and unauthorized access to sensitive data.
Maintain the Roster's Accuracy
Remove outdated accounts from the domain server to reduce security risks. Hackers can exploit dormant accounts to infiltrate the network. Monitor requests to migrate emails and files from these accounts closely and set deadlines for completion. Promptly deactivate accounts that have reached the deadline.
Device Retrieval Process
The HR department and IT must ensure that employees return all employer-provided devices, including laptops, computers, and mobile phones. Before reallocating these devices to other staff members, it is essential to recover and reset them to factory settings.
Revise Passwords and Online Access
Collaborate with the IT department to update the passwords for the network, cloud software, financial institutions, and vendor sites if the departing employee has access. Also, deactivate the former employee's email addresses to ensure they cannot be used for new account registration and revoke any access privileges, including those for remote databases and the virtual private network (VPN).
Double protection
Create a policy for departing employees to protect corporate data confidentiality, including using a mobile device management tool to delete corporate data from personal devices. HR should stay updated on personnel changes and communicate with new and departing employees, keeping the IT department and other staff informed. Offboarding is crucial for maintaining strong information security.
More in News