Before looking for a provider of IT support in Long Island, think about what kind of services you want to outsource. Do you want to streamline your current business processes? Do you want to replace your legacy systems? Do you want to improve your backup procedures?
These are all legitimate reasons, but there’s another one that many companies forget: to handle data after employees leave. More often than not, this shouldn’t be a problem for most employees, as it’s only natural for people to amicably part ways with their current companies in favor of greener pastures. But there are exceptions, such as employees who are laid off or fired. Leaving under such circumstances can lead to negative feelings that serve as fuel for negative actions, like intentionally leaking sensitive information that can hurt the company.
Data theft is a real threat, and come to think of it, even well-intentioned employees can end up taking confidential data with them and risk exposing it, albeit unintentionally. Thus, it’s important that your company has a security plan especially for managing leaving employees, whether voluntarily or involuntarily. Together with your trusted provider of IT support in Long Island, here are some things you must do:
- Encrypt information – Data should be encrypted in transmission, whether via wireless network transmissions or local network transmissions. It should also be encrypted in storage, either in mobile devices or a web portal.
- Decrypt only as needed – An on-the-fly decryption model ensures that just the needed parts of a file are decrypted into memory as opposed to the whole file. So, in case the system gets hacked, cyber criminals will still not have access to complete files, just intelligible chunks.
- Back up important information – A malicious employee can delete company data as petty revenge, but if you have backups as part of your data recovery in Long Island, restoring the lost data shouldn’t be a challenge. Also, archive emails for this very reason.
- Purge temporary files – Local storage with automatic purge enabled should be used for temporary files. Also, temporary files should not be backed up in the first place.
- Implement strict user authentication – Two-factor authentication, strong password policy, and single sign-on login using work-sanctioned accounts should be applied so that only authorized users can access sensitive information.
- Apply fine-grained access control – Permissions should be granular, allowing you to grant a highly specific set of access rights for every possible role (e.g., end user, super user, system administrator, etc.).
- Activate remote-wipe for BYOD devices – If your company follows the bring-your-own-device (BYOD) policy, employees can use their own smartphone or tablet for work. You can’t confiscate their personal property when they leave, so you should be able to delete confidential data remotely.
It’s hard to do all these on your own, so you need an experienced provider you can trust like us at Total Technology Solutions. Our main goal is to take care of our clients’ technology concerns and deliver end-to-end solutions so that they can focus on their core business. We accomplish this by listening, understanding, and remediating before delivering high-quality IT support in Long Island. Contact us today to learn more about our services.