SMBCyberHub Logo SMBCyberHub Home

Your First Week With a New Hire: A Simple Security Onboarding Plan

26 Aug 2025

Hiring someone new? Great. The first week is when good security habits stick (or don’t). This simple plan gets a new starter set up safely without turning day one into an IT saga.

Goal: Create the right accounts, set the right permissions, and build 3 essential habits: strong passwords, MFA, and quick reporting.


✅ Day 0 (Before They Start)

Create only what they need for week one.

  • Account setup: Email + core tools (calendar, docs, chat, CRM/accounting if relevant).
  • Groups/roles: Add them to team groups (e.g., “Sales-EU”, “Ops-APAC”) — avoid giving “All Admin” access.
  • MFA required: Enforce MFA on first login (app-based or hardware key).
  • Device ready: Issue a laptop with auto-lock (5–10 mins), full-disk encryption, and automatic updates enabled.
  • Welcome note: Send a friendly “how we do security” message and the checklist below.

Why it matters: Least-privilege access prevents accidental data exposure and keeps you compliant with client/insurer expectations. MFA significantly reduces account-takeover risk.

For a plain-English overview you can share with your team, see CISA’s quick guide to enabling MFA.


✅ Day 1 (First Login)

Make access simple, safe, and successful.

  • Password manager: Install and show how to use it (unique, long passwords — no sharing).
  • MFA set-up check: Confirm the authenticator works and capture one secure recovery method.
  • Phishing basics (5 mins): Show one real example; agree on your “report suspicious” path (Slack/Teams/email).

Tip: Keep it human — “If you’re unsure, ask. Reporting early is always OK.”


✅ Day 2 (Tools & Files)

Share the right stuff, the right way.

  • Shared drives/folders: Add to the team’s working areas; avoid private doc silos.
  • Calendar & comms: Subscribe them to team calendars; set channel norms (what to share where).
  • Client data rules: Plain-English dos/don’ts (no personal cloud, no unknown USBs, no forwarding to personal email).

Outcome: Work flows from day two, without scattering files across personal devices or inboxes.


✅ Day 3 (Device Confidence)

Lock it down without killing productivity.

  • Auto-lock & updates: Confirm screen lock is active and OS/browser updates are automatic.
  • Mobile access: If using a phone for work email, ensure screen lock + remote-wipe are enabled.
  • Backups: Verify docs live in shared storage or are auto-backed up (no “desktop only” files).

Reason: Most small-team incidents come from lost devices or exposed files — these steps remove that risk early.


✅ Day 4 (Access Review in 10 Minutes)

Right level, no oversharing.

  • Check they can access everything needed for this role.
  • Remove any extra access accidentally granted (test links for “Anyone with link” and fix to “Team”).
  • For shared mailboxes/API keys, store credentials in the manager — never a note or DM.

Outcome: Least privilege from week one — and fewer surprises later.


✅ Day 5 (Quick Practice & “What If”)

One tiny exercise beats a 30-slide deck.

  • Two-minute drill: Ask them to “report a suspicious email” using your agreed path.
  • Mini-scenario: “If you lose your laptop/phone, what’s step one?” (Answer: tell us immediately; we’ll remote-lock/wipe.)
  • Wrap-up: Remind them that mistakes are reported, not hidden — speed matters, not blame.

📌 Ongoing (Set It and Forget It)

  • Monthly: Manager checks access for their team (adds/removes as roles change).
  • Quarterly: Rotate any shared passwords/API tokens still in use.
  • When they change roles: Review permissions the same week — don’t wait.

🧰 Handy Templates You Can Use

  • New-starter security checklist (this page)
  • “How we report suspicious stuff” one-pager
  • Device set-up sheet (auto-lock, updates, encryption)

🎁 Free Resource

Need a ready-to-use training starter that matches this plan?
👉 Download the Free Cyber Security Training Kit


Related post:
For fast policy and training wins, read Audit-Ready in Under an Hour: A Cyber Hygiene Checklist next.