Be sure that you have standardized, centralized processes in place for managing access to third-party applications that employees are using for work-related activities. It’s especially important to maintain visibility into those applications that are outside the organization’s standard login and user authorization systems.
This can include so-called “shadow IT”—cloud apps that employees turn to without the approval or oversight of your IT team. Requiring employees to adhere to a formal review and approval process before procuring new software can help.
You should also keep close tabs on departing employees’ relationships with third parties including vendors, suppliers, and customers. Be sure that the right people are informed whenever one of their contacts leaves the company.
Today’s computing environments encompass a wide array of devices—from traditional workstations to mobile devices—and an equally diverse assortment of third-party and cloud-hosted software solutions. To manage the risks that come with job changes, it’s essential to focus on identity and access management. Strong governance can go a long way towards keeping your data and intellectual property safe.
Want to learn more about taking a holistic approach to risk management, compliance and IT strategy? Check out our comprehensive governance, risk, and compliance services.