Summer Worker Security - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Applications
Commentary
6/30/2010
03:28 PM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Summer Worker Security

Temporary and summer workers offer the chance to increase production -- and increase your security risks. But taking on summer help also offers the opportunity to review, refresh and enhance your security policies and practices.

Temporary and summer workers offer the chance to increase production -- and increase your security risks. But taking on summer help also offers the opportunity to review, refresh and enhance your security policies and practices.Even in tight economic times, taking on temporary workers is an occasional (and welcome) necessity. Summers especially see small and midsized business employment ranks swell with workers on break from college and high school.

These workers are an important part of the labor pool, and as anyone who's run a business knows, summer workers most often make fine additions to the staff, and sometimes forge longlasting business and personal relationships.

Indeed, a study by security firm Actimize revealed that employers felt far more distrust of full-time workers than of temporary and part-time help.

A few steps taken before the summer staff reports to work can help ensure that they don't bring security risks or introduce security concerns into your business.

Don't grant network access to temporary workers unless their job specifically requires it.

If you grant employees access to the Internet for personal use, consider a waiting period before extending the privilege to summer workers (or any new employee for that matter). Especially for short-term employees, access to the Internet may be an unnecessary perk.

Make clear upfront exactly what your policies are regarding personal devices brought into the workplace. Smartphones, music players and USB drives can bring viruses and other malware into the workplace; be sure your summer employees understand your rules about such devices and adhere to them.

Summers end, of course, and with their end comes the departure of those now-familiar workers. Before you send them on their way, you should:

Check to be sure that any network log-ins and passwords, if granted, have been disabled.

Discontinue any company e-mail or other accounts issued to summer workers.

Don't forget to collect other security and access related tools, including badges and swipe cards.

These are, clearly, basic security issues and considerations, applicable to all employees. Just don't forget to apply them to summer and temporary workers as well.

Don't Miss: When Employees Leave, Make Sure They're Gone

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
Reflections on Tech in 2019
James M. Connolly, Editorial Director, InformationWeek and Network Computing,  12/9/2019
Slideshows
What Digital Transformation Is (And Isn't)
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/4/2019
Commentary
Watch Out for New Barriers to Faster Software Development
Lisa Morgan, Freelance Writer,  12/3/2019
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll