The departure of an employee who had access to keys to your business premises can pose significant security risks. Whether the separation was voluntary or involuntary, it’s essential to take proactive steps to safeguard your business and prevent unauthorized access.
S. Fahl, M. Harbach, H. Perl, M. Koetter, and M. Smith. Proceedings of the 2013 ACM SIGSAC Conference on Computer &\#38; Communications Security, page 49--60. New York, NY, USA, ACM, (2013)
L. Grunske, and P. Zhang. Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, page 183--192. New York, NY, USA, ACM, (2009)
A. Fragkiadakis, V. Siris, and N. Petroulakis. Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)