Staff Protocols

Many businesses are great at telling their IT provider to create a new user and what access rights to grant them, however some aren’t so good at removing old users after a period of time. IT Providers commonly reset an outgoing staff member’s password to prevent them from any network access, but can often be slack at working with the needs of the business to eventually remove that user altogether.

In many cases we have seen types of passwords that are set up when a new staff member begins still remain the same password years later. We have also seen many staff members abuse the company’s network by downloading and running pirated software, despite strict employment contract clauses against that.

In one extreme case we have identified a staff member that was passing on trade secrets and their company’s own IP information to a rival.


The needs of the business to have good procedures for managing their staff is essential. We work with you to deliver:

  • Company data audit
  • Users and Groups permissions review
  • Remote access review
  • Incoming and Outgoing staff procedures review
  • Files & Folders access audit review
  • Remote delivery & execution review
  • 3rd party connectivity review