Updated Best Practices Guide for Firing A Network Security Administrator

Firing an employee who has significant knowledge of and privileged access to your Information Technology infrastructure can be a stressful event. That's why Pivot Point Security created the Best Practices for Firing A Network Security Administrator.
 
March 13, 2012 - PRLog -- Information Security Assurance firm, Pivot Point Security, has updated its document, Best Practices for Firing A Network Security Administrator.  The guide outlines good practices for dealing with the dismissal or resignation of a key IT / IS employee, to reduce these risks. (e.g., theft of confidential data)

• Want to know how to fire a Network Admin?
• Need to know what precautions to take?

Firing any employee can be a stressful event.  Firing one who has significant knowledge of and privileged access to your Information Technology / Security infrastructure is even more stressful, as the risks are  notable.  The greater the risk this employee and situation pose – the more of these practices you will need to execute.

“Let’s face it, times are tough!”  says Mike Gargiullo, Sr. Security Consultant, “Companies are faced with all kinds of challenges – especially in the realm of personnel.”

When discussing policies, procedures and standards with customers, Pivot Point Security consultants ask “What if you had to fire your security network administrator? The person who is in charge of the security of your systems”

You can hope it never happens to you – or you can be prepared – by following these simple, common-sense tips – before, during and after.

The updated Best Practices guide can help your network maintain its security – no matter who is monitoring it.

Best Practices for Firing A Network Security Administrator is segregated into four components:

• Notable risks
• Pre-firing activities
• During firing
• Post firing

The updated Best Practices for Firing A Network Security Administrator is now available free from Pivot Point Security.

http://www.pivotpointsecurity.com/firing-network-security...

# # #

Leading Information Security Assessment Firm - Continually evolving technology, business requirements, regulations, and threats make “being secure” and “proving you’re compliant” increasingly complex. The only logical response: Simplify.
End
Pivot Point Security News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share