Pay Attention to Access Devices

In today’s age, personal devices are a given risk. They have allowed companies to augment performance and throughput by giving access to systems outside of standard business hours and locations. But allowing access to secure systems via these devices can be extremely risky.

  • Implement clear access rules to ensure employees have access to only the information they require.
  •  Put in place auditing process for access granted to business resources, including a reporting/review process.
  •  Ensure termination processes include functions for disabling access to business systems.