Properly introduce and further develop chatbots

Chatbots are on the rise. The acceptance of users is increasing. For companies, these digital helpers represent another opportunity to interact with their customers. But how does the introduction of a chatbot succeed?

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Roger Siegenthaler: "I am 60 percent pastor today".

Being the market leader and living start-up characteristics? At first glance, that sounds controversial. But that's exactly what the Bern-based company mb-microtec is doing. But this is not possible without a far-reaching cultural change.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

When employee offboarding becomes a security vulnerability

When employees leave the company, everyone from HR to IT knows what needs to be done. But IT security is consulted too rarely: security leaks and unwanted data leakage are the result.

Quickly copying some data onto a private USB stick before leaving the company for good: Employee offboarding can turn out to be an IT security risk (symbol image).
Image: © UNSPLASH.COM

A rude awakening after being fired: In a recent case, an employee at a U.S. credit union destroyed 21 GB of confidential data after she was terminated. Although she was already perceived as a potential threat, IT had disabled her network access too late. For about 40 minutes, the person was able to remotely access the file server and delete data. The damage amounted to 10000 US dollars. This is not an isolated incident, as the Ponemon Institute shows in its "Insider Threats Report 2020" study. The nearly 1000 companies surveyed worldwide stated that almost one in four security incidents caused by employees was due to criminal motives, and 14 percent involved the theft of credentials. The fact that one in six incidents is "only" due to negligence does not make the situation any better. Each incident ultimately costs time and money to repair the damage.

From analog peccadillo to digital crime

Obviously, gone are the days of disgruntled leavers stealing pencils or maliciously mishandling files. Today, sensitive digital information is copied surreptitiously, business contacts are taken away and, in the worst cases, files on the network are manipulated or deleted. The peccadillo of the analog world turns out to be a crime in the digital one.

These examples clearly show that the utmost care is required in offboarding - and this is where the IT security department plays a greater role than previously assumed. Today, it is no longer enough to collect the employee smartcards and work devices (from notebooks to smartphones) and deactivate the e-mail inbox. Rather, all access to messengers, tools, cloud services or networks, among other things, must also be changed or closed. This is not yet included in the offboarding checklists of many companies, or only to some extent.

The situation becomes really critical when employees have already made their decision to leave the company long beforehand. In practice, the problem of "internal resignation" has a direct impact on security-related behavior: These people often no longer take security policies very seriously, are less careful when dealing with e-mails or disclose sensitive data. In the worst case, this behavior represents an enormous potential risk over a longer period of time. Experts compare these actors with so-called internal perpetrators, who can be classified as a security risk due to deliberately negligent behavior or criminal intent. The European Union Agency for Cyber Security (ENISA) has recognized the problem of domestic perpetrators and included it in its list of top 15 threats.

When insider knowledge is exploited ...

But this is not the end of the story. Even after leaving, ex-employees remain a source of danger. In May 2021, for example, Ruag reported an alleged hacker attack on its own IT systems. And the search for clues baffled the experts: There was no evidence of an attack in the log files. The suspicion quickly arose that former company employees, with their insider knowledge, were responsible. Against this background, employee offboarding should definitely be included in IT risk management. At present, this happens even less frequently than the consideration of employee departures from a security perspective. In many companies, risk management focuses primarily on the physical security of IT. This is absolutely right, because most risks arise from the threats posed by all digital devices in use. More and more, however, the spotlight is shining on "soft factors" that can cause a security incident. This primarily refers to employees in general, who influence the company's security level through their behavior. But supervisors and even administrators also come into play as a risk if they set up processes in an unclean manner or communicate in an ambiguous manner. Or - as in the case of employees leaving - IT security is not fully considered in the process. Successful risk management stands and falls with the evaluation of all risks.

Secure offboarding: Short checklist for IT security

Company leaders are well advised to revise the offboarding process in terms of IT security as quickly as possible. Often, existing checklists simply need to be expanded or guidelines adapted to the situation. Experts also recommend expanding risk management to include threats posed by the departure of employees. In this way, financial damage and loss of reputation due to departing ex-colleagues can be effectively avoided.
In addition, IT managers should definitely use these basic processes:

  • Revoke access rights and reset passwords for all apps and services
  • Block building access
  • Reclaim all physical devices of the company
  • Prevent email forwarding and file sharing
  • Assign licenses to other users
  • Conduct exit interview to check for suspicious behavior
  • Final review of monitoring/logging tools for indications of unusual activity.
  • Involvement of human resources department or lawyer if suspicious activities are detected

Author

Michael Klatte has worked as PR Manager for ESET Germany since 2008. His area of activity includes corporate and B2B communications in the DACH region. ESET is a European company that develops security software already in use by over 110 million users.
> www.eset.ch

Digitization in family businesses as a generational issue?

The Corona pandemic has undoubtedly accelerated digitization processes. While young companies or those led by digital natives should have no problem with this, family businesses sometimes find it more difficult.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Hiring freelancers without nasty surprises

What is a "freelancer"? The fact is: there is no legal definition for it. However, that does not diminish its popularity. There are many ideas about what a freelancer is. However, these are often wrong and thus harbor many a risk for the commissioning companies.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Into international business - now more than ever!

In the globally networked markets of the 21st century, the Covid 19 pandemic leaves behind a kaleidoscope of effects, new framework conditions and challenges. Looking ahead, the question for many companies and their employees is how to best exploit entrepreneurial potential.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Cellulose layer instead of plastic film

Researchers at Empa, together with Lidl Switzerland, have developed a kind of "eco-coat" for fruits and vegetables. The novel cellulose-based coating helps to reduce packaging and avoid food waste.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Pregnancy and breastfeeding in harmony with work

The economy has a great interest in women remaining in the work process during pregnancy and breastfeeding. Therefore, it is important to regulate employment well during this time.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Leadership in team sports

With the start of the sports season in Europe, questions about personal and team performance have again regularly arisen. What analogies are there to teams in companies?

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Smooth telephony integration in CRM is essential

The personnel service provider Stellenwerk repeatedly had stability problems with its telephony solution. In particular, the integration with Salesforce, but also the supplier's lack of flexibility in cooperating with the IT partner, promoted the decision to procure IT, telephony and Internet from a single source at Netrium and its partner iWay.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!

Acquisition of a company by means of an acquisition company

A company acquisition usually needs debt financing. In order to ensure the amortization of the loan, the dividends of the acquired company should flow to the buyer as tax-efficiently as possible. The establishment of an acquisition company represents an interesting model in this respect.

You need to be logged in to view this content. Please . Not a Member? Subscribe now!
get_footer();