Find them and fire them: 5 steps
Spotting and handling rogue employees before they make the news
Computerworld - After my first day with a client on the regional fringe of Iraq, I was happy to find a room with decent air conditioning and an Internet connection. Then I started looking around.
My first clue something was amiss with my hotel should have been the double concrete barricade at the street, the metal detectors at every door and the airport-style X-ray machine. But what clinched it was the swagger of tank-top-and-fatigue-wearing American men smoking in the lobby, each with a semiautomatic pistol jammed down his waistband or the overt machismo of a dangling combat knife.
The concierge explained I'd wandered into an R&R hotel for Blackwater USA, which recently had been in the news for its mercenaries' involvement in a string of violent deaths and allegations of weapons smuggling. (Blackwater refers to itself as a "private military company," but now that Iraq is nominally self-governing, supplying personnel and engaging in combat there is mercenary business according to Article 47.c of the Geneva Conventions.)
Watching how influential or powerful people act in their off-hours can be telling, especially in high-stress situations. After witnessing Blackwater personnel engaging in unprofessional behavior such as doing burnouts in a jacked-up Escalade, brandishing weapons, and spewing loose talk about company business (not to mention public consumption of alcohol in an Islamic locale), none of this news is even slightly surprising.
Five steps to find them
It's tough to find effective and ethical people to fill positions of influence or power. Whether the role is that of security guard for a convoy out of the Green Zone or security administrator for critical systems, missteps can directly lead to the death of innocent people, and intentional abuse is the stuff of nightmares.
Worse, it's the people who really want power and influence who are most likely to mishandle it. I don't have a line on ways to see into other people's minds and evaluate their current and future ethical capacity and personal risk factors, but here are a few steps you can take to spot an internal danger before too much damage is done.
(Note: Laws and social norms regarding termination vary widely, so the involvement of an attorney is key to making sure any termination process is handled reasonably and lawfully. These opinions are not legal advice and may contain information that is improper for your locale.)
1. Set clear goals. Drop authority into idle hands and corruption from power happens fast. Termination is an easy decision when someone simply doesn't have the professional or ethical rectitude to handle a job. The solution is to make sure employees have clear goals for their initial work, let them prove they can handle it, and then slowly add responsibility and authority. With good references and recommendations that speak to a person's ethical behavior and professionalism -- not just technical ability and certifications -- it also becomes reasonably safe to hire directly into positions of significant responsibility.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts