-- particles

What Are Employee On-boarding And Separation Procedures?

When we bring on a new client, we create a document that outlines all of the steps and tasks required to get a new employee set up in their organization.  Creating a step by step procedure and checklist helps ensure that the process is handled the same way every time and that nothing is missed.  Sometimes we end up with a base procedure, that we will apply to all employees, as well as a departmental procedure, that will be applied only to staff working in that department. 

We work closely with your management team to ensure that new employees have a smooth first day, as well as to protect the business when there is an unexpected employee separation. 

 In Addition to a detailed on-boarding procedure, here are a few of the IT related things that should be documented for all employees:

  • General description of workflow, function, and role
  • List of devices used and software used
  • List of hosted systems that each user has access to
  • Description of server, and data access requirements (folders, files & shares)
  • Company-owned devices that each employee has possession of (laptop, tablet, smartphone)
  • Any remote access accounts, VPN accounts, or other forms of remote access to company data
  • Physical access controls like key fobs or mechanical keys

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

LB signature

Related Posts

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...

The Advantages and Disadvantages of a Password Manager

Advantages Enhanced Security - Password managers excel in generating robust, unique passwords for each account, diminishing the threat of security breaches stemming from weak or reused passwords. Convenience - They offer a hassle-free means to store and automatically input login credentials, saving precious time and effort, with just one master password to remember. Organization - Password...

How to Transition to or Establish a New Office Location

It’s always exciting when you can expand your business’ influence with a new location, but this excitement brings with it all kinds of complications. There’s always something, whether it’s the technology for the new location or the logistics surrounding the opening. Let’s look at how you can make sure that technology is not the thing that holds your business back from opening a new location. All ...

Browser Hijacking Attacks are a Serious Threat

Understanding Browser Hijacking Attacks Browser hijacking attacks involve the stealthy installation of malicious software onto a user's web browser. This malware can range from adware and spyware to more sophisticated forms like ransomware and keyloggers. The primary goal of these attacks is to gain unauthorized access to sensitive information or disrupt the user's browsing experience. Common Te...