Managing Employees Securely
Today we are talking about managing employees securely. There are some basic types of employees in certain businesses or companies — new employees, promoted or demoted employees, and fired employees.
The emphasis here is not necessarily spelling out every detail on how to deal with each although there are some pointers mentioned below. Rather, the primary emphasis pointed out herein is that there are indeed different types of employees in certain businesses or organizations which implies the need for a policy known as “least privilege”.
The policy of least privilege emphasizes that employees should be given access to resources within a company only to the extent which allows them to get their jobs done — any more access granted than that which is needed increases the overall risk of security breaches.
A secretary who works at a front desk answering phones and managing communications within a company probably should not be given access to a company’s financial resources or any other computer data revealing it — this is a good example of least privilege.
Other basic and common security measures taken as part of managing the said types of employees should be included in a policy.
These include but are not limited to
- acceptable computer login times
- strict password policies
- procedures for hiring
- and firing
Additionally, acceptable break rooms or break areas and a separation of company WiFi from lobby WiFi. Company computers should not be accessing the same WiFi access points that personal computers are accessing due to increased risk of company security breaches.
There is no exact science for securing a business with regard to computers, digital devices, and employees who use them, but there are indeed some basic and common practices that should be followed. Books can be obtained on the internet that educates one on basic security practices similar to what is put forth herein.
The post Managing Employees Securely appeared first on AE Technology Group.