ÒÁÈËÖ±²¥

Skip to main content

Checklist for Security During Employee Offboarding

One of the most important times to prevent data loss is at the end of the employee journey. However, it’s not unusual for data security checks to be left out of the offboarding process. HR, security, IT and people managers should collaborate when using this checklist to ensure their business is secure from all angles.

 

This infographic will cover:

  • Why security checks on employee data activity should be made as far back as 3 months before employees’ last day
  • What offboarding steps should be taken in the two weeks leading up to the employee’s last day — and the 2 most important security checks for the day they depart
  • More collective tips for IT, HR, security and people managers to improve their offboarding process

 

An infographic listing nine tips on how to include security in your employee offboarding process.

 

In the Tips for Including Security in Employee Offboarding infographic, you’ll learn why security checks during employee offboarding is so important and what steps to take during the employee offboarding process. It’s the nature of the business that employees come and go, but the ones on their way out present the highest security risk to an organization’s data. They may copy, email or upload valuable customer lists to take to their next job. They can leave with critical intellectual property or trade secret files.

All of this increases the potential for Insider Risk. Use this checklist to learn how to implement an offboarding process in HR. With ÒÁÈËÖ±²¥ Incydr™, organizations can structure an insider risk program to identify, investigate and quickly respond when data is moved to where it doesn’t belong.

 

About the Author

As director of security operations at ÒÁÈËÖ±²¥, Nathan leads the team responsible for security tooling, red team exercises and responding to security events. Nathan joined ÒÁÈËÖ±²¥ in 2016, bringing experience from both the private and public sector, and is a graduate of the Masters of Science in Security Technologies (MSST) program at the University of Minnesota.

Profile Photo of Nathan Hunstad