(616) 828-5360

  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies
  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies
Nov 14

Are Your Ex-Employees Still in Your System?

When an employee leaves your business, they go through (or they should, at least) a comprehensive offboarding process where you collect their keys, laptops, and other assets you gave them to do their jobs. You may have collected these physical keys, but certainly not their digital keys. You might still see them pop up in the instant messaging app, or you might find recent activity from their account in your shared drive, all of which is problematic.

If you’re not careful, ex-employees might still be using company resources for their own personal use, and this can create a serious security risk for your business—not to mention the legal ramifications should anything bad happen.

Security Risks Associated with Ex-Employees

Imagine that your former employees are just going about their day-to-day lives, only to accidentally expose your business to security risks.

It’s not unheard of for business data to linger on employee devices long after their employment with a business ends, and while it’s not always intentional, it is most definitely a problem that should be addressed. You might even experience issues with disgruntled former employees engaging in sabotage. They might have left your business with a bone to pick, and if they realize their passwords still work, they could cause all kinds of problems, either by stealing your client list or selling it to your competitors.

This is a problem you don’t want to deal with—and it’s one that can easily be prevented with a sound offboarding process.

Shared Accounts Create Even More Issues

Now imagine that the employee isn’t the only one using login credentials for a shared service or application.

The password for that service is used by multiple people, including the one who just walked out the door, never to be seen again… Unless, of course, they show up in the activity feed for this app or service. While it might seem ridiculous to change a password used by your entire staff, think about it. What would happen if the former employee accidentally exposed that credential to a threat? It could put your entire business at risk.

In general, you don’t want to leave these digital doors open to former employees, and we’ll show you how to close them.

Here’s Your Proactive Offboarding Checklist

If your business is having trouble with offboarding employees, we’ve got just what you need: a list of non-negotiable tasks we like to call an offboarding checklist:

  • Immediately disable the employee’s accounts
  • Terminate all active sessions
  • Wipe all personal mobile devices to only remove company data
  • Revoke all access to shared groups or folders
  • Convert the email to a shared mailbox that forwards to the employee’s manager

In the end, the employee simply has no access to any of their former work accounts, data, devices, or otherwise—exactly the way they shouldn’t.

Fusion IT can help you implement this strategy for your business. To learn more, call us at (616) 828-5360.

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

Posts by Topic

  • Annual Golf Scramble
  • Best practices
  • Blog
  • Business
  • Cloud
  • How To
  • IT Blog
  • Miscellaneous
  • News
  • Newsletter Archive
  • Security
  • Technology
  • Tip of the Week

Tags

2FA ai Backup Best Practices Business cloud Computer Current Events cybersecurity Data Data Recovery Disaster Recovery Efficiency Email Gadgets Hackers Hardware Innovation IT Services IT Support Malware Managed Service Microsoft Miscellaneous Mobile Device Network Security Outsourced IT Phishing Privacy Productivity Ransomware Saving Money security Small Business Smartphone Social Media Software Technology Tip of the Week trust Upgrade User Tips Windows Windows 7 Workplace Strategy

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • July 2024
  • November 2023
  • October 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • September 2021
  • January 2021
  • October 2020
  • June 2020
  • January 2020
  • September 2019
  • July 2019
  • June 2019
  • November 2018
  • February 2018
  • January 2018
  • November 2017
  • October 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • July 2015
  • June 2015

Recent Posts

  • Controversial Uses of AI Technology in Society
  • Your Digital Life 101: The Difference Between Creating an Account and Logging In
  • A Byte-Sized History Lesson About the Hamburger Menu
  • Why Your $50 Router Is Strangling Your Profits
  • Don’t Fall for These BYOD Dangers
  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies
  • Windows 10 End of Life Countdown
  • IT Services
    • IT Services
    • IT Support
    • FIT Assurance Security Business Series
    • FIT Assurance Security Live Series
  • Industries
    • Small Business
    • Manufacturers
    • Non-Profits
    • Service
  • About
    • About Us
    • Leadership Team
    • Blog
    • News
    • Privacy Policy
  • Support
  • Careers
  • Contact
  • Millennia Technologies