Warning When Hiring Temporary and Seasonal Staff

June 13, 2019

Cathy Coloff, Founder, IT Radix

Many businesses leverage temporary or seasonal staff.  The benefits are obvious—expertise and additional resources/capacity when you need it. With the advances in technology, utilizing these types of personnel is even easier.  However, what may not be so obvious are the network security risks; in particular, the increased potential for compromised sensitive data or loss of control of the data.

With some upfront planning, technology, temporary staff, and your business can be perfect together.  Here are things to keep in mind:

Determine how they will access your data

When bringing on temporary staff, you need to decide how they are going to access your computer data.  Are they going to use their own computers (BYOD) or will you be providing it (COPE)?  If it’s the latter, you will have greater control over what and how they access information and ensure network security.  If the temporary staff provides their own equipment, you will have less control and will need to think carefully about how you give access to your data.  This includes email which is easily setup on mobile devices such as smartphones and tablets.

Implement good policies and procedures

Whether you opt for COPE or BYOD, be sure to have good policies and procedures for managing your corporate technology assets and information—especially for those workers who will be with you for only a short time.  Clearly outline ownership of your data, how it is to be accessed and handled, and what should happen at the end of employment.

Require passwords and encryption

On mobile devices, require passwords to access the device itself as well as your data.  Consider implementing device encryption.  Whenever possible, enable the ability to remotely wipe a device (this includes laptops) should it be lost.  Consider implementing mobile device management software that will enforce company policies.

Allow access to data on an as-needed basis

Too often, temporary workers are given full access to company networks when perhaps all that is needed is access to a particular project or client area.  Work with your IT support to ensure that all access is given on an as-needed basis and maintain your network security.

Need some upfront help with planning your network security?  Call IT Radix, and we’ll be happy to get you started.



Subscribe to Guest BlogGuest Blog