The departure of an employee who had access to keys to your business premises can pose significant security risks. Whether the separation was voluntary or involuntary, it’s essential to take proactive steps to safeguard your business and prevent unauthorized access.
N. Forgó, A. Haidar, und H. Gerhartinger. Peter Coveney, Vanessa Díaz-Zuccarini, Peter Hunter, Marco Viceconti (editors), Computational biomedicine : modelling the human body, Oxford University Press, (2014)
S. Fahl, Y. Acar, H. Perl, und M. Smith. ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security, ACM, (2014)
B. Carminati, E. Ferrari, und A. Perego. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. Montpellier, France, October 29 -- November 3, 2006. Proceedings, Part II, Volume 4278-2 von Lecture Notes in Computer Science, Seite 1734-1744. Springer, (2006)
D. Singelee, und B. Preneel. IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (MASS), Seite 7 pp.-840. IEEE, (November 2005)