Other options include:
- Removing their LAN or other hosts usernames and passwords so that even if they are able to access the environment, they cannot use or abuse any resources or assets.
- Changing all your Administrator or root type passwords in case any of your former employees has access to these.
- Auditing your environment for old users, unknown users, or generic users that might be used to perform malicious acts. If those former employees can dial up or connect remotely to your organization without a username and password then I feel you have a broader security problem than simply potential malicious behaviour by laid-off workers and you need to secure your perimeter as soon as possible with appropriate access controls.
Dig Deeper on Linux security risks and threats
Related Q&A from James Turnbull
A user wants to implement OSSEC on a Windows server because he has no server side Linux operating system.continue reading
Solaris 10 Trusted Extensions and SELinux are best suited to different system requirements and administrator skill sets. Our security expert explains...continue reading
Configuring spam filters Spamassassin and dspam together in the email server Postfix is easy with the resources listed by our security expert.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.