{"id":11304,"date":"2022-03-01T00:01:22","date_gmt":"2022-02-28T23:01:22","guid":{"rendered":"https:\/\/www.organisator.ch\/?p=11304"},"modified":"2022-03-11T10:35:38","modified_gmt":"2022-03-11T09:35:38","slug":"wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird","status":"publish","type":"post","link":"https:\/\/www.organisator.ch\/en\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/","title":{"rendered":"When employee offboarding becomes a security vulnerability"},"content":{"rendered":"<figure id=\"attachment_11305\" aria-describedby=\"caption-attachment-11305\" style=\"width: 950px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11305\" src=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg\" alt=\"\" width=\"950\" height=\"550\" srcset=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg 950w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-680x394.jpg 680w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-768x445.jpg 768w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-18x10.jpg 18w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-302x175.jpg 302w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-605x350.jpg 605w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-920x533.jpg 920w, https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird-300x174.jpg 300w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><figcaption id=\"caption-attachment-11305\" class=\"wp-caption-text\">Quickly copying some data onto a private USB stick before leaving the company for good: Employee offboarding can turn out to be an IT security risk (symbol image).<br \/>Image: \u00a9 UNSPLASH.COM<\/figcaption><\/figure>\n<p>A rude awakening after being fired: In a recent case, an employee at a U.S. credit union destroyed 21 GB of confidential data after she was terminated. Although she was already perceived as a potential threat, IT had disabled her network access too late. For about 40 minutes, the person was able to remotely access the file server and delete data. The damage amounted to 10000 US dollars. This is not an isolated incident, as the Ponemon Institute shows in its \"Insider Threats Report 2020\" study. The nearly 1000 companies surveyed worldwide stated that almost one in four security incidents caused by employees was due to criminal motives, and 14 percent involved the theft of credentials. The fact that one in six incidents is \"only\" due to negligence does not make the situation any better. Each incident ultimately costs time and money to repair the damage.<\/p>\n<h2>From analog peccadillo to digital crime<\/h2>\n<p>Obviously, gone are the days of disgruntled leavers stealing pencils or maliciously mishandling files. Today, sensitive digital information is copied surreptitiously, business contacts are taken away and, in the worst cases, files on the network are manipulated or deleted. The peccadillo of the analog world turns out to be a crime in the digital one.<\/p>\n<p>These examples clearly show that the utmost care is required in offboarding - and this is where the IT security department plays a greater role than previously assumed. Today, it is no longer enough to collect the employee smartcards and work devices (from notebooks to smartphones) and deactivate the e-mail inbox. Rather, all access to messengers, tools, cloud services or networks, among other things, must also be changed or closed. This is not yet included in the offboarding checklists of many companies, or only to some extent.<\/p>\n<p>The situation becomes really critical when employees have already made their decision to leave the company long beforehand. In practice, the problem of \"internal resignation\" has a direct impact on security-related behavior: These people often no longer take security policies very seriously, are less careful when dealing with e-mails or disclose sensitive data. In the worst case, this behavior represents an enormous potential risk over a longer period of time. Experts compare these actors with so-called internal perpetrators, who can be classified as a security risk due to deliberately negligent behavior or criminal intent. The European Union Agency for Cyber Security (ENISA) has recognized the problem of domestic perpetrators and included it in its list of top 15 threats.<\/p>\n<h2>When insider knowledge is exploited ...<\/h2>\n<p>But this is not the end of the story. Even after leaving, ex-employees remain a source of danger. In May 2021, for example, Ruag reported an alleged hacker attack on its own IT systems. And the search for clues baffled the experts: There was no evidence of an attack in the log files. The suspicion quickly arose that former company employees, with their insider knowledge, were responsible. Against this background, employee offboarding should definitely be included in IT risk management. At present, this happens even less frequently than the consideration of employee departures from a security perspective. In many companies, risk management focuses primarily on the physical security of IT. This is absolutely right, because most risks arise from the threats posed by all digital devices in use. More and more, however, the spotlight is shining on \"soft factors\" that can cause a security incident. This primarily refers to employees in general, who influence the company's security level through their behavior. But supervisors and even administrators also come into play as a risk if they set up processes in an unclean manner or communicate in an ambiguous manner. Or - as in the case of employees leaving - IT security is not fully considered in the process. Successful risk management stands and falls with the evaluation of all risks.<\/p>\n<h2>Secure offboarding: Short checklist for IT security<\/h2>\n<p>Company leaders are well advised to revise the offboarding process in terms of IT security as quickly as possible. Often, existing checklists simply need to be expanded or guidelines adapted to the situation. Experts also recommend expanding risk management to include threats posed by the departure of employees. In this way, financial damage and loss of reputation due to departing ex-colleagues can be effectively avoided.<br \/>\nIn addition, IT managers should definitely use these basic processes:<\/p>\n<ul>\n<li>Revoke access rights and reset passwords for all apps and services<\/li>\n<li>Block building access<\/li>\n<li>Reclaim all physical devices of the company<\/li>\n<li>Prevent email forwarding and file sharing<\/li>\n<li>Assign licenses to other users<\/li>\n<li>Conduct exit interview to check for suspicious behavior<\/li>\n<li>Final review of monitoring\/logging tools for indications of unusual activity.<\/li>\n<li>Involvement of human resources department or lawyer if suspicious activities are detected<\/li>\n<\/ul>\n<h2>Author<\/h2>\n<p>Michael Klatte has worked as PR Manager for ESET Germany since 2008. His area of activity includes corporate and B2B communications in the DACH region. ESET is a European company that develops security software already in use by over 110 million users.<br \/>\n&gt; <a href=\"https:\/\/www.eset.com\/ch-de\/\">www.eset.ch<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Nach der Entlassung das b\u00f6se Erwachen: In einem aktuellen Fall vernichtete eine Mitarbeiterin einer US-amerikanischen Kreditgenossenschaft 21 GB vertraulicher Daten, nachdem ihr gek\u00fcndigt worden war. Obwohl sie bereits als potenzielle Gefahr wahrgenommen wurde, hatte die IT ihren Netzwerkzugriff zu sp\u00e4t deaktiviert. Etwa 40 Minuten lang konnte die Person remote auf den Dateiserver zugreifen und Daten [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11305,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Mitarbeiter-Offboarding","_yoast_wpseo_metadesc":"Bei Mitarbeiter-Offboarding wird die IT-Sicherheit zu selten konsultiert: Sicherheitslecks und unerw\u00fcnschter Datenabfluss sind die Folge.","articlekey":"","footnotes":""},"categories":[578,582],"tags":[2649,254,260],"class_list":["post-11304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-abo","category-operational-excellence","tag-ausgabe-1-2-2022","tag-hrm","tag-ict-sicherheit"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird - Organisator<\/title>\n<meta name=\"description\" content=\"Bei Mitarbeiter-Offboarding wird die IT-Sicherheit zu selten konsultiert: Sicherheitslecks und unerw\u00fcnschter Datenabfluss sind die Folge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.organisator.ch\/en\/subscription\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird - Organisator\" \/>\n<meta property=\"og:description\" content=\"Bei Mitarbeiter-Offboarding wird die IT-Sicherheit zu selten konsultiert: Sicherheitslecks und unerw\u00fcnschter Datenabfluss sind die Folge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.organisator.ch\/en\/subscription\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/\" \/>\n<meta property=\"og:site_name\" content=\"Organisator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrganisatorFachmagazin\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T23:01:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-11T09:35:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/aa2bace6c5c5aad60102004a50c4eb1c\"},\"headline\":\"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird\",\"datePublished\":\"2022-02-28T23:01:22+00:00\",\"dateModified\":\"2022-03-11T09:35:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/\"},\"wordCount\":831,\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg\",\"keywords\":[\"Ausgabe 1-2\\\/2022\",\"HRM\",\"ICT-Sicherheit\"],\"articleSection\":[\"ABO+\",\"OPERATIONAL EXCELLENCE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/\",\"name\":\"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird - Organisator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg\",\"datePublished\":\"2022-02-28T23:01:22+00:00\",\"dateModified\":\"2022-03-11T09:35:38+00:00\",\"description\":\"Bei Mitarbeiter-Offboarding wird die IT-Sicherheit zu selten konsultiert: Sicherheitslecks und unerw\u00fcnschter Datenabfluss sind die Folge.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg\",\"width\":950,\"height\":550,\"caption\":\"Noch schnell ein paar Daten auf den privaten USB-Stick kopieren, bevor man das Unternehmen endg\u00fcltig verl\u00e4sst: Das Offboarding von Mitarbeitenden kann sich als IT-Sicherheitsrisiko entpuppen (Symbolbild). Bild: \u00a9 UNSPLASH.COM\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/abo\\\/2022-03-01\\\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.organisator.ch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#website\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"name\":\"Organisator\",\"description\":\"Kompetent. Praxisnah. Der ORGANISATOR bereitet in 10 Ausgaben pro Jahr die wesentlichen Themen f\u00fcr F\u00fchrungskr\u00e4fte von KMU auf.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.organisator.ch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#organization\",\"name\":\"Organisator\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"contentUrl\":\"https:\\\/\\\/www.organisator.ch\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Logo_Organisator_Website.png\",\"width\":800,\"height\":77,\"caption\":\"Organisator\"},\"image\":{\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/OrganisatorFachmagazin\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/organisator-das-magazin-fr-kmu\",\"https:\\\/\\\/www.xing.com\\\/news\\\/pages\\\/organisator-ch-695\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGP2Sq0iWaZwT3BdIAQFYpw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.organisator.ch\\\/#\\\/schema\\\/person\\\/aa2bace6c5c5aad60102004a50c4eb1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/www.organisator.ch\"],\"url\":\"https:\\\/\\\/www.organisator.ch\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When employee offboarding becomes a security vulnerability - Organizer","description":"When it comes to employee offboarding, IT security is too rarely consulted: security leaks and unwanted data leakage are the result.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.organisator.ch\/en\/subscription\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/","og_locale":"en_US","og_type":"article","og_title":"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird - Organisator","og_description":"Bei Mitarbeiter-Offboarding wird die IT-Sicherheit zu selten konsultiert: Sicherheitslecks und unerw\u00fcnschter Datenabfluss sind die Folge.","og_url":"https:\/\/www.organisator.ch\/en\/subscription\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/","og_site_name":"Organisator","article_publisher":"https:\/\/www.facebook.com\/OrganisatorFachmagazin","article_published_time":"2022-02-28T23:01:22+00:00","article_modified_time":"2022-03-11T09:35:38+00:00","og_image":[{"width":950,"height":550,"url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#article","isPartOf":{"@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/"},"author":{"name":"admin","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/aa2bace6c5c5aad60102004a50c4eb1c"},"headline":"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird","datePublished":"2022-02-28T23:01:22+00:00","dateModified":"2022-03-11T09:35:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/"},"wordCount":831,"publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"image":{"@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg","keywords":["Ausgabe 1-2\/2022","HRM","ICT-Sicherheit"],"articleSection":["ABO+","OPERATIONAL EXCELLENCE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/","url":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/","name":"When employee offboarding becomes a security vulnerability - Organizer","isPartOf":{"@id":"https:\/\/www.organisator.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#primaryimage"},"image":{"@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#primaryimage"},"thumbnailUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg","datePublished":"2022-02-28T23:01:22+00:00","dateModified":"2022-03-11T09:35:38+00:00","description":"When it comes to employee offboarding, IT security is too rarely consulted: security leaks and unwanted data leakage are the result.","breadcrumb":{"@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#primaryimage","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/02\/Organisator-Wenn-das-Mitarbeiter-Offboarding-zur-Sicherheitsluecke-wird.jpg","width":950,"height":550,"caption":"Noch schnell ein paar Daten auf den privaten USB-Stick kopieren, bevor man das Unternehmen endg\u00fcltig verl\u00e4sst: Das Offboarding von Mitarbeitenden kann sich als IT-Sicherheitsrisiko entpuppen (Symbolbild). Bild: \u00a9 UNSPLASH.COM"},{"@type":"BreadcrumbList","@id":"https:\/\/www.organisator.ch\/abo\/2022-03-01\/wenn-das-mitarbeiter-offboarding-zur-sicherheitsluecke-wird\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.organisator.ch\/"},{"@type":"ListItem","position":2,"name":"Wenn das Mitarbeiter-Offboarding zur Sicherheitsl\u00fccke wird"}]},{"@type":"WebSite","@id":"https:\/\/www.organisator.ch\/#website","url":"https:\/\/www.organisator.ch\/","name":"Organizer","description":"Competent. Practical. In 10 issues per year, ORGANISATOR presents the essential topics for managers of SMEs.","publisher":{"@id":"https:\/\/www.organisator.ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.organisator.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.organisator.ch\/#organization","name":"Organizer","url":"https:\/\/www.organisator.ch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/","url":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","contentUrl":"https:\/\/www.organisator.ch\/wp-content\/uploads\/2022\/01\/Logo_Organisator_Website.png","width":800,"height":77,"caption":"Organisator"},"image":{"@id":"https:\/\/www.organisator.ch\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrganisatorFachmagazin","https:\/\/www.linkedin.com\/showcase\/organisator-das-magazin-fr-kmu","https:\/\/www.xing.com\/news\/pages\/organisator-ch-695","https:\/\/www.youtube.com\/channel\/UCGP2Sq0iWaZwT3BdIAQFYpw"]},{"@type":"Person","@id":"https:\/\/www.organisator.ch\/#\/schema\/person\/aa2bace6c5c5aad60102004a50c4eb1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.organisator.ch"],"url":"https:\/\/www.organisator.ch\/en\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/11304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/comments?post=11304"}],"version-history":[{"count":3,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/11304\/revisions"}],"predecessor-version":[{"id":12104,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/posts\/11304\/revisions\/12104"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media\/11305"}],"wp:attachment":[{"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/media?parent=11304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/categories?post=11304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.organisator.ch\/en\/wp-json\/wp\/v2\/tags?post=11304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}