301-571-5040    Get SUPPORT

Washington Works Blog

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

The Walking, Talking Dead
Unfortunately, employees sometimes do things that force a business owner or manager to terminate his/her employment contract. Other employees leave if they have problems with management or find better opportunities elsewhere. Unfortunately for the business, a clean break may not be possible, and a disgruntled former employee can make things extremely difficult for your business.

One way that a former employee can virtually haunt your business is through the use of social media. If it was a rough break, a former employee can slander your business on social networks such as Facebook and Twitter, as well as social media designed for employer reviews like LinkedIn and the anonymous review site, Glassdoor. This may be nothing more than a hindrance, and typically no one is going to pay a solitary source much mind, but if multiple complaints of the same nature start popping up on social media, you might spook the high-end talent out of considering working with your business.

Residing Evil
Another way former employees can hurt your business, is if you let them. When they leave, you have to remember to ensure that any account authorization they had access to is deleted. There have been cases where former employees will make their way onto their former company’s infrastructure or network and corrupt things, either manually or with the help of malware.

Typically, those who would go ahead and effectively hack their former employers’ systems, know what they are looking for, and use this access to make it more difficult for a company’s business to run efficiently. As long as your IT administrators have a plan on how to remove former users and do so immediately after the employee is let go, this may not be much of an issue.

Some former employees have deliberately built in a way into a network away from the procedural protocols outlined by IT administrators. In these cases, a full network audit is necessary to ensure that any trace of the worker is removed promptly. Any other result keeps the potential for jaded former employees to do some pretty disgusting things to your company’s network.

Trick or Treating
While some former employees want to take it out on their former employer, some former employees will want to steal company data, client data, or intellectual property. In fact, in one study done by security experts Symantec, data showed that nearly half of all fired employees had kept some sort of confidential corporate information. While this may not be a massive deal, 40 percent of them planned on using that data at a new job.

While organizations may not be able to completely avoid this from happening, there are some courses of action that can be taken to ensure that this data isn’t used against their own company. Make every employee sign, and enforce, a non-compete agreement, while also utilizing access control systems to ensure the people who don’t need certain information, don’t have access to said information. Giving people fewer chances to make off with data is a great way to keep people from taking it in the first place.

Business can be scary sometimes, and the last thing you need is for your bottom line to be hacked and slashed because of your former employees. At Washington Works, we can help you protect your data and network from all manners of threats; and; help make sure that former employees don’t haunt you long after their gone. To learn exactly how we can help you, call us today at 301-571-5040.

4 Backup and Recovery Terms You Should Understand
Should You Outsource Your IT Project’s Management?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Cloud Malware Privacy Hackers Productivity Network Security Business Email Software Tech Term Hosted Solutions Internet Mobile Devices Data Backup Computer Data Ransomware Backup Managed IT Services IT Support Microsoft Data Recovery User Tips Google Hardware Efficiency Productivity Innovation Cloud Computing Outsourced IT Small Business Managed Service Provider IT Services Smartphone Business Continuity Workplace Tips Business Management Paperless Office Android Encryption Social Media Data Management Windows 10 Save Money Managed IT Services Communication Collaboration Browser Office 365 Windows 10 Remote Monitoring Smartphones Server Disaster Recovery Bandwidth Holiday Government Employer-Employee Relationship Work/Life Balance Infrastructure Tip of the week Facebook Antivirus VoIP Scam Wi-Fi Cybersecurity Vulnerability App Passwords IT Management Healthcare BDR Unified Threat Management Phishing Artificial Intelligence Internet of Things BYOD Communications Money Windows Chromebook Network Mobile Device Virtual Reality Managed Service Two-factor Authentication Information Risk Management How To Apps Maintenance SaaS Applications Quick Tips Politics Word Customer Relationship Management Hosted Solution Big Data Chrome Office File Sharing Compliance Document Management Password Saving Money Upgrade Blockchain Remote Workers Wireless Regulations IoT Patch Management Mobile Device Management Storage Automobile Company Culture Machine Learning Vendor Management Automation Identity Theft Point of Sale Data loss Telephone Systems Access Control HIPAA Alert Health Tech Support G Suite How To Mobile Security VPN Firewall Hacker Private Cloud Computer Care Data Security Samsung Electronic Medical Records Taxes Business Technology Physical Security Twitter Smart Technology Microsoft Office Downtime Server Management Virtual Private Network Computing Training Websites Robot Website Router Bring Your Own Device Meetings Recovery Remote Monitoring and Management Social Employees Gmail Botnet Remote Computing Vulnerabilities Conferencing Spam Computing Infrastructure Value Law Enforcement CCTV Spyware Address Virtualization Specifications Administrator Computer Repair Permissions Webcam Monitors WPA3 RMM Google Calendar Procurement Avoiding Downtime Search Zero-Day Threat Printer Wearable Technology Education Upgrades Processors Utility Computing Features Break Fix Cookies Geography Instant Messaging Alerts Gadget Black Friday Social Networking Disaster Heating/Cooling Help Desk Fraud Star Wars Fleet Tracking Operating System Legislation Chatbots WiFi Security Cameras Time Management Managing Stress Travel Backup and Disaster Recovery Relocation Cleaning Networking Electronic Health Records Dark Web Augmented Reality Nanotechnology High-Speed Internet Finance Licensing Cortana Black Market Professional Services Monitoring Cyber Monday Motherboard Supercomputer Uninterrupted Power Supply Servers Enterprise Content Management Bookmarks IBM Cost Management YouTube Emoji Asset Tracking Tech Terms Mouse Identity GPS Printing Network Management Crowdsourcing Motion Sickness Managed IT MSP Human Error SharePoint Management Cyberattacks The Internet of Things Microsoft Excel Screen Reader Development Authentication Gadgets Budget Cooperation Analytics USB Consulting IT Budget Unified Communications Favorites Hotspot Assessment Web Server Settings OneNote Theft Tablet Office Tips Tracking Remote Worker IT Support Touchscreen Personal Information Corporate Profile Outlook Update Proactive Permission Downloads IT Technicians Error Google Drive Enterprise Resource Planning Files Smart Tech Solid State Drive Statistics Legal Cables Authorization Users Unified Threat Management Staff IT Consultant Lenovo Dongle Managed Services Provider Distributed Denial of Service Digital Payment Project Management Customer Service Language Internet Exlporer Cameras Digital Mail Merge Employee-Employer Relationship Comparison ROI Cabling Connectivity WannaCry Shortcut Test Multi-Factor Security Mirgation Staffing Financial VoIP Techology Notifications Mobile Read Only Hard Disk Drive Bluetooth Sports Wires User Error Firefox Superfish IT Solutions Service Level Agreement E-Commerce Managed IT Service Modem Cybercrime Notes Hard Drives Printers Public Speaking CrashOverride Presentation Lithium-ion battery Regulation Emergency Wireless Technology 5G Safety Marketing Hiring/Firing Competition IP Address Fun Miscellaneous Mobile Office Domains