Elf on the Shelf: Office Chaos Edition

If you've followed along with the Elf on the Shelf tradition in recent years, you know that the elf is supposed to be reporting to Santa on the behavior of those they are watching over. This year, SumnerOne joined in on the fun and we added Peppermint the Elf to our payroll! Peppermint was our newest employee and we were so excited to welcome her to the SumnerOne family, even if the fun had to be short-lived. After all the fun and games, we knew Peppermint would have to be headed back to the North Pole. We can't wait to see what she will have up her sleeve for next year.

Peppermint's Week of Mischief at SumnerOne



When we first found our new friend Peppermint in the office, we knew our week would be filled with some fun. Each morning, Peppermint kept us on our toes and guessing what she would be up to next. Whether she was just chilling out on the decorations or making a fresh cup of coffee, we loved having her around to add some holiday spirit.

A few of our favorite Peppermint antics were when she went zip lining across our demo room floor, or when she used our production print equipment to print us out a life-sized selfie to remember her. Our Elf on the Shelf had loads of fun and provided our office with a lot of good laughs. Peppermint was a great edition to SumnerOne, but we knew our fun times with her were limited, as she was only a seasonal employee.

On Christmas Day, Peppermint handed in her seasonal resignation and was back on her way to the North Pole until next year. As with any other employee, we knew there were some security measures we had to take after her departure to keep ourselves and our data safe.

Securing your Business After an Employee Leaves

While we know Peppermint would never cause our business any harm, there are still security precautions that needed to be taken. Most businesses are worried about protecting themselves from external security issues and don't worry as much about the internal threat lurking right around the corner. Internal employees can pose as just as big of a security risk as the cyber criminals of the world.

While your employees may be compromising your security without knowing it, there are also disgruntled employees doing so with malicious intent. Whether the employee has left your office on good terms or bad, there are security measures your business should follow to protect itself after their departure. Here are a few of our tips about how to protect your business after an employee has left:

  • Change the passwords on accounts or profiles that the employee had access to.
  • Terminate old accounts or profiles that the employee is no longer using.
  • Avoid using shared names and passwords.
  • Conduct a review of employee access points and delete accounts that are not needed to perform daily responsibilities.
  • Maintain daily backups of all computer networks.
  • Let third-party vendors that handle your email or customer support know that the employee is no longer with your company.
  • Create a termination procedure, this way when an employee leaves nothing with your business security will be left up to chance.

We may not be worried about Peppermint tampering with sensitive data or unleashing a cyber attack on us, but we still have to follow protocol. Securing your business should be top of mind when an employee leaves, whether it is under good terms or bad. We're sure our IT team will have Peppermint's credentials back in working order when she comes back to visit next year. In the meantime, she's back at work at the North Pole and its business as usual at SumnerOne.

SumnerOne Security Plan

Is it time for your business to create a security plan to keep your data from walking out the door with past employees? We're here to help. Contact our experts at SumnerOne to learn more about implementing security measures to protect your business and your valuable data. Give us a call or reach out online to learn more about how we can help.

LOOKING TO LEARN MORE?

Subscribe to Our Blog

Get the latest updates on printing, IT, and business technology.