Onboarding
The process that is followed when an organization enters a partnership with a new employee.
This includes things like filling out Human Resources paperwork and setting up a new work environment for the employee. Normally, HR will ensure completion of all the necessary documents before an employee starts working at an organization, but it might help to verify that the following documents have been signed by an incoming employee:
- the Acceptable-Use-Policy
- a Non-Disclosure-Agreement
- a Bring Your Own Device Policy It'll help to obtain a list of things that the new employee would need. Pieces of hardware would include:
- a computer
- a mouse
- a keyboard
- and a phone As well as access to software the company uses for work, such as:
- productivity software
- messages software
- analytical tools
- customer service management software
- ticketing software When setting up user accounts for the new employee, use the principle of least privilege, meaning give the new user the least amount of permissions so that they can still perform their tasks, but won't have permission to do something they shouldn't. If they have their own phone line, you might want to setup their voicemail service and extension line. Following your company's Physical-Security-Policy, make sure that they have the proper access codes, key fobs, or smart cards to get to approved locations within the organization's premises.
Training
After you've setup company resources for the use of the new employee, verify that:
- they know how to access and use them
- how to work all the equipment
- log onto their accounts
- access the company knowledge base
- and how to contact IT support
- they know and understand the organizations security policies.
Remember that the cause for most technical problems is human error. Sometimes they have malicious intent, but for most cases they're simply misinformed. Make sure to hold security trainings for all new employees, which'll educate them on security procedures. They should learn:
- how to recognize security breaches and exploits when they occur
- what to do in the event of one
See it's sibling, offboarding.
#II
No comments to display
No comments to display