SoftActivity

Protecting Your Company Network Part 2. An HR Checklist

September 21st, 2015

This is Part 2. Part 1 “Offboarding Right” of these series is posted here

Think all this worrying about disgruntled employees might be a bit overblown? Perhaps you recall the Sony security breach from a few months back wherein a ton of company data got turned over to North Korean hackers. The company is still picking up the pieces from that one – and analysts believe it all started with a combination of outside threats and an internal employee breach.

Photo Credit: Don Hankins

Photo Credit: Don Hankins

Read More

Protecting Your Company Network Part 1. Offboarding Right

September 14th, 2015

You’ve done all the right things to protect your network from both insider threats and outside hackers. Employee computer monitoring is just one of the tools you’ve used to keep your intellectual property (IP) safe, along with antivirus software, a properly set-up firewall and other bits and pieces put together by your IT team. But one area where companies seem to still be vulnerable is with leaving openings to former (and potentially disgruntled) employees.

Computer monitoring for security

Photo Credit: Mr. Seb

Read More