{"id":6004,"date":"2020-02-20T20:59:08","date_gmt":"2020-02-20T20:59:08","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6004"},"modified":"2021-04-08T21:26:37","modified_gmt":"2021-04-08T20:26:37","slug":"when-they-leave-offboarding-policies-security","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security","title":{"rendered":"When They Leave: Offboarding Policies for Security"},"content":{"rendered":"<p>It happens. One of your customers\u2019 employees moves on to a new gig. Whether it\u2019s for more pay, more responsibility, or just a change of pace, they\u2019re onto a new adventure.<\/p>\n<p>Unfortunately, just because this employee left on good terms and seems a likely candidate for leaving a top-notch review on Glassdoor, you can\u2019t take your chances. When employees leave\u2014whether by choice or due to a firing or layoff\u2014they represent a risk. They can use their old access and knowledge to steal data or customers or to place malware that just generally causes havoc.<\/p>\n<p>As an MSP, you need to protect your customers from potentially malicious former employees. Today, I want to cover important offboarding policies to consider when employees leave.<\/p>\n<h3>When They Leave<\/h3>\n<p>As mentioned earlier, any employee who leaves\u2014whether by choice or not\u2014represents a risk. They have insider knowledge of your company, operations, systems, and data. While a sysadmin could likely do more chaos than a graphic designer, nearly everyone who leaves introduces some level of risk. And don\u2019t forget\u2014the employee doesn\u2019t need to be malicious to potentially damage the company. A user might retain access on their phone to a single app they needed to use while working, have that account get compromised, then end up unwittingly causing a data breach.<\/p>\n<p>So here are a few tips to help you reduce your risk:<\/p>\n<ul>\n<li><strong>Plan ahead during onboarding:<\/strong>\u00a0Preparing for an employee\u2019s exit should start when they\u2019re hired. Keep an inventory of all devices given to employees and a list of services the employee will consistently access. If you\u2019re taking on a new client, you\u2019ll need to do this inventory for their existing employees. Track all inventories in a central location like an\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm?promo=blog\" target=\"_blank\" rel=\"noopener\">RMM<\/a>\u00a0tool. Doing this could save you a lot of hassle down the line.<\/li>\n<li><strong>Recover all equipment:<\/strong>\u00a0When someone finally leaves, gather all equipment from them and make sure you aren\u2019t missing anything from your inventory. This includes laptops, company-provided smartphones and tablets, and keys for the building. While this physical security measure often falls within the domain of HR, make sure to coordinate with them (or take the task on yourself with a site visit) to help prevent any unnecessary risks.<\/li>\n<li><strong>Shut down accounts:<\/strong>\u00a0Once someone leaves, start shutting down their account access immediately. If you followed the first step, you should have a list of services the employee can access, making this step much easier. You don\u2019t want someone logging into the company social media account and making unfavorable comments that harm your customers\u2019 reputation.<\/li>\n<li><strong>Active monitoring:<\/strong>\u00a0Beyond shutting down accounts, you\u2019ll want to have monitoring in place to check for unauthorized access attempts after someone leaves. For risky employees with access to sensitive data, you should always have this level of monitoring in place to begin with. If someone knows they plan to leave or are worried about being laid off or fired, they may begin copying files or data well before they officially leave the company. Monitoring accounts for security issues like mass deleting or copying files or installing unusual software can help reduce the risk of them harming the organization before they leave.<\/li>\n<li><strong>Training:\u00a0<\/strong>It\u2019s just as important to make sure that you\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/blog\/a-fresh-approach-to-security-awareness-training\" target=\"_blank\" rel=\"noopener noreferrer\">train employees on good security practices<\/a>\u00a0and consistently remind them of those practices. They should know how important it is to avoid copying data outside of the organization and to avoid sharing passwords. Also, remind employees not to let ex-employees into the building unsupervised. They may trust the person, but that trust could be dangerous. An ex-employee could easily drop by for a quick lunch with a former coworker and end up doing harm while in the building. Just stay on the safe side and don\u2019t leave anyone who isn\u2019t a current employee unattended in the building.<\/li>\n<li><strong>Don\u2019t waver:<\/strong>\u00a0Finally, it\u2019s worth mentioning that you should remain consistent in your policies. Don\u2019t make exceptions\u2014if you can\u2019t recover a device, try to wipe it remotely. If someone leaves but still contracts for the organization, create new accounts for them with new permissions (or at least reduce their permissions in the account). Double check that employees follow the rules on letting former workers back into the building. Just play it safe and make sure your team stays consistent.<\/li>\n<\/ul>\n<h3>Locking Down the Fortress<\/h3>\n<p>At the end of the day, when employees leave, you want to make sure they can\u2019t harm the organization. Most employees are on the level, but it\u2019s the few who aren\u2019t that you have to worry about. But when you put the proper controls in place and take the right steps, you can drastically reduce the risk of a breach.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>While it\u2019s important to offboard your customers\u2019 employees properly, it\u2019s perhaps even more important to take the proper precautions for your own MSP\u2019s employees. One bad employee could compromise multiple customers and seriously harm your business (and theirs).\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/ocular?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\">SolarWinds<sup>\u00ae<\/sup>\u00a0Passportal<\/a>\u00a0can help you during the employee offboarding process by allowing you to quickly shut off access to services for employees\u2019 accounts. Additionally, it helps you enforce strong password policies in your MSP practice. Learn more by visiting\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/?promo=blog\" target=\"_blank\" rel=\"noopener noreferrer\">the site today<\/a>.\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><em>Colin Knox is head of community engagement, SolarWinds MSP<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It happens. One of your customers\u2019 employees moves on to a new gig. Whether it\u2019s for more pay, more responsibility, or just a change of pace, they\u2019re onto a new&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6004","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When They Leave: Offboarding Policies for Security - N-able<\/title>\n<meta name=\"description\" content=\"Even if an employee leaves one of your customers on good terms, you can\u2019t take any chances with the security of their data, so you need to ensure system access is revoked ASAP. Colin Knox offers key tips on offboarding.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When They Leave: Offboarding Policies for Security - N-able\" \/>\n<meta property=\"og:description\" content=\"Even if an employee leaves one of your customers on good terms, you can\u2019t take any chances with the security of their data, so you need to ensure system access is revoked ASAP. Colin Knox offers key tips on offboarding.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-20T20:59:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T20:26:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"When They Leave: Offboarding Policies for Security\",\"datePublished\":\"2020-02-20T20:59:08+00:00\",\"dateModified\":\"2021-04-08T20:26:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\",\"name\":\"When They Leave: Offboarding Policies for Security - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-02-20T20:59:08+00:00\",\"dateModified\":\"2021-04-08T20:26:37+00:00\",\"description\":\"Even if an employee leaves one of your customers on good terms, you can\u2019t take any chances with the security of their data, so you need to ensure system access is revoked ASAP. Colin Knox offers key tips on offboarding.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Best Practices\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/best-practices\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When They Leave: Offboarding Policies for Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"When They Leave: Offboarding Policies for Security - N-able","description":"Even if an employee leaves one of your customers on good terms, you can\u2019t take any chances with the security of their data, so you need to ensure system access is revoked ASAP. Colin Knox offers key tips on offboarding.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security","og_locale":"de_DE","og_type":"article","og_title":"When They Leave: Offboarding Policies for Security - N-able","og_description":"Even if an employee leaves one of your customers on good terms, you can\u2019t take any chances with the security of their data, so you need to ensure system access is revoked ASAP. Colin Knox offers key tips on offboarding.","og_url":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-02-20T20:59:08+00:00","article_modified_time":"2021-04-08T20:26:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"When They Leave: Offboarding Policies for Security","datePublished":"2020-02-20T20:59:08+00:00","dateModified":"2021-04-08T20:26:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security"},"wordCount":902,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Best Practices"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security","url":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security","name":"When They Leave: Offboarding Policies for Security - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-02-20T20:59:08+00:00","dateModified":"2021-04-08T20:26:37+00:00","description":"Even if an employee leaves one of your customers on good terms, you can\u2019t take any chances with the security of their data, so you need to ensure system access is revoked ASAP. Colin Knox offers key tips on offboarding.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/when-they-leave-offboarding-policies-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Best Practices","item":"https:\/\/www.n-able.com\/de\/blog\/category\/best-practices"},{"@type":"ListItem","position":2,"name":"When They Leave: Offboarding Policies for Security"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=6004"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6004\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=6004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}