crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

The Walking, Talking Dead
Unfortunately, employees sometimes do things that force a business owner or manager to terminate his/her employment contract. Other employees leave if they have problems with management or find better opportunities elsewhere. Unfortunately for the business, a clean break may not be possible, and a disgruntled former employee can make things extremely difficult for your business.

One way that a former employee can virtually haunt your business is through the use of social media. If it was a rough break, a former employee can slander your business on social networks such as Facebook and Twitter, as well as social media designed for employer reviews like LinkedIn and the anonymous review site, Glassdoor. This may be nothing more than a hindrance, and typically no one is going to pay a solitary source much mind, but if multiple complaints of the same nature start popping up on social media, you might spook the high-end talent out of considering working with your business.

Residing Evil
Another way former employees can hurt your business, is if you let them. When they leave, you have to remember to ensure that any account authorization they had access to is deleted. There have been cases where former employees will make their way onto their former company’s infrastructure or network and corrupt things, either manually or with the help of malware.

Typically, those who would go ahead and effectively hack their former employers’ systems, know what they are looking for, and use this access to make it more difficult for a company’s business to run efficiently. As long as your IT administrators have a plan on how to remove former users and do so immediately after the employee is let go, this may not be much of an issue.

Some former employees have deliberately built in a way into a network away from the procedural protocols outlined by IT administrators. In these cases, a full network audit is necessary to ensure that any trace of the worker is removed promptly. Any other result keeps the potential for jaded former employees to do some pretty disgusting things to your company’s network.

Trick or Treating
While some former employees want to take it out on their former employer, some former employees will want to steal company data, client data, or intellectual property. In fact, in one study done by security experts Symantec, data showed that nearly half of all fired employees had kept some sort of confidential corporate information. While this may not be a massive deal, 40 percent of them planned on using that data at a new job.

While organizations may not be able to completely avoid this from happening, there are some courses of action that can be taken to ensure that this data isn’t used against their own company. Make every employee sign, and enforce, a non-compete agreement, while also utilizing access control systems to ensure the people who don’t need certain information, don’t have access to said information. Giving people fewer chances to make off with data is a great way to keep people from taking it in the first place.

Business can be scary sometimes, and the last thing you need is for your bottom line to be hacked and slashed because of your former employees. At Integrated Business Technologies, we can help you protect your data and network from all manners of threats; and; help make sure that former employees don’t haunt you long after their gone. To learn exactly how we can help you, call us today at (918) 770-8738.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips Hosted Solutions IT Services Hackers Backup Email Malware Business Software Data Mobile Devices IT Support Small Business Network Hardware Communication Server Smartphones Computer VoIP Business Continuity Upgrade Windows Efficiency Innovation Google Data Backup Disaster Recovery Mobile Device Management Virtualization Microsoft Office Outsourced IT Vendor Management Tech Term Miscellaneous Mobile Office Holiday Gadgets Social Media Network Security Quick Tips Passwords Productivity BYOD User Tips Android Smartphone Browser Mobile Computing WiFi Bring Your Own Device Windows 10 Internet of Things Data Recovery Managed IT services Best Practice Ransomware Users Spam Remote Monitoring The Internet of Things Apple Remote Computing Artificial Intelligence Wireless Technology Alert Collaboration Data Management Save Money Trending Operating System Firewall Content Filtering Customer Relationship Management History Gmail Unified Threat Management Office Encryption Going Green Maintenance Cloud Computing App Managed IT IT Support Router Big Data Printer Tech Support Analytics IT Solutions Lithium-ion Battery Facebook Information Technology Current Events IT Consultant Avoiding Downtime Antivirus Paperless Office Phishing Document Management Hard Drives Mobile Device Wi-Fi Windows 8 Employer-Employee Relationship Website Customer Service Applications Managed IT Services Humor Two-factor Authentication Saving Time Bandwidth Automation Application Project Management Cybersecurity Virus Office Tips Retail Fax Server IT service Digital Payment Outlook Chrome Health Business Growth VPN Risk Management Marketing Excel Hacking Government Computers Phone System Compliance Apps Computer Repair Proactive IT Training Point of Sale Recovery Mouse Money Help Desk Social User Error Net Neutrality Running Cable Licensing Unified Communications Co-Managed IT Wireless File Sharing Data Security PowerPoint Social Networking Infrastructure Tablet Healthcare Office 365 Password Inbound Marketing iPhone Vulnerability Managed Service Administration Presentation Augmented Reality BDR Regulations Files Budget Sports Machine Learning Hacker Programming Internet Exlporer Flexibility Hosted Solution User Remote Monitoring and Management Storage Mobility Smart Technology Data storage Company Culture Analyitcs Twitter Education Mobile Security communications Robot Safety Specifications IoT IBM Windows 10 Settings Printing Cost Management End of Support Save Time Tip of the week LiFi Cybercrime Computing Wearable Technology Conferencing Hiring/Firing Display Alerts Statistics Scam Intranet Remote Workers Competition Business Intelligence Network Congestion Information Recycling Data loss Blockchain eWaste Downtime HIPAA Search Virtual Desktop USB Piracy Redundancy Business Owner Cryptocurrency Heating/Cooling Proactive Computer Accessories Mirgation Consulting Access Control Cyber Monday Google Docs Consumers Crowdfunding Smart Tech Authentication Macro Managing Stress IT Management Bitcoin Business Technology Managed Services Provider Private Cloud SharePoint IP Address Connectivity Authorization Enterprise Content Management Network Management Hacks Refrigeration Disaster WPA3 Gaming Console Touchscreen Migration E-Commerce Public Cloud Downloads Distributed Denial of Service Employees Vulnerabilities Hotspot Networking Digital Signature Fleet Tracking Chatbots Features Sync Multi-Factor Security Software Tips Managed IT Service Memory Star Wars Zero-Day Threat Geography Language Virtual Reality Laptop Asset Tracking Identity Electronic Health Records Mobile Device Managment Google Calendar Break Fix Monitors Documents Utility Computing Backup and Disaster Recovery High-Speed Internet Adminstration Server Management Computing Infrastructure SaaS Techology Halloween Deep Learning Entrepreneur Google Wallet Undo OneNote 3D Cyberattacks PC Care Legislation Dark Web Writing 5G PDF Value People Human Error Development eBay Cooperation Chromebook Disaster Resistance Scary Stories Drones Employee-Employer Relationship Remote Support Motherboard Read Only Leadership G Suite New Additions Data Warehousing Social Engineering Buisness Skype Streaming Media Hard Drive Permission Print Server Cables Text Messaging Patch Management Staff IT Consulting Identities Backups Domains Work Station Modem Bookmarks Travel Software as a Service Scheduling Congratulations Microsoft Excel Fun CIO LinkedIn Cache Test Law Firm IT Wires Video Surveillance Operations Politics Data Breach Solid State Drive Word Legal Public Speaking Windows 8.1 Update Cookies Favorites Meetings Technology Tips Cortana Best Available Management Virtual Private Network Telephony Technology Laws Alt Codes Monitoring Nanotechnology Instant Messaging Comparison Enterprise Resource Planning How To Permissions Knowledge YouTube Environment Bluetooth MSP IT Technicians Unified Threat Management Typing Identity Theft Black Friday Google Drive Online Currency Samsung Screen Reader Finance Debate Mobile Assessment Fraud How To Experience Troubleshooting

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code