{"id":46895,"date":"2022-05-31T13:00:00","date_gmt":"2022-05-31T13:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=109704"},"modified":"2022-05-31T13:00:00","modified_gmt":"2022-05-31T13:00:00","slug":"streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/","title":{"rendered":"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle"},"content":{"rendered":"<p>In 2021, workers everywhere reevaluated their professional and personal choices, leading to what became known as the Great Resignation. In 2022, a new trend that many are calling the Great Reshuffle has emerged, with 43 percent of the workforce saying they\u2019re very likely to consider changing jobs or exiting their industry altogether in the coming year.<sup>1<\/sup><\/p>\n<p>As our 2022 Work Trend Index, Great Expectations: Making Hybrid Work <em>Work<\/em>, revealed, employees have a new \u201cworth it\u201d equation and are voting with their feet.<sup>2<\/sup> As a result, employees are onboarding and offboarding more frequently. The constant flow of tasks, starting with applying for a job and navigating the first few days of employment, leaves much room for error, thus increasing stress for HR, IT, and each new employee.<\/p>\n<p>Given that 73 percent of employees want to keep their work options flexible, more than three-quarters of Chief Human Resource Officers (CHROs) plan to preserve the newer hybrid work options available today and accommodate the flexibility that existing and prospective employees desire.<sup>3<\/sup> Unfortunately, the complexity and cost of both onboarding and offboarding employees have increased in our new hybrid reality.<\/p>\n<p>The 2022 Work Trend Index surveyed more than 31,000 people in 31 countries and found that 53 percent of people are likely to consider transitioning to hybrid work in the year ahead. <\/p>\n<p>Workforce feedback and statistical studies reveal two challenges <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access-management\/verifiable-credentials\">specific to credentialing<\/a>:<\/p>\n<ol>\n<li>The rising cost and frustration of employee onboarding.<\/li>\n<li>Increased <a href=\"https:\/\/www.microsoft.com\/security\">security risks<\/a> of employee offboarding.<\/li>\n<\/ol>\n<h2>The rising costs and frustration of employee onboarding<\/h2>\n<p>The typical multistep process of the new hire onboarding journey became even more convoluted during the pandemic with the rise of both hybrid and fully remote work. As a result, managing the details of recruiting, interviewing, and hiring has become increasingly challenging, leading to a sharp rise in costs.<\/p>\n<p>Organizations struggle with navigating the start of the employee journey for both in-person and remote workers in the most efficient and secure way possible. For example, the chart in Figure 1 summarizes the findings of a private study Microsoft conducted in 2021 to understand who\u2019s involved in tasks associated with identity verification for new employees. Responses from 3,000 organizations show that HR and IT split these tasks almost evenly and that across the 14 industries surveyed, onboarding accounts for an astounding 14 to 31 percent of all ID verification spending.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"932\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0-932x1024.png\" alt=\"Graph showing ID verification spend across multiple industries with finance spending leading all other industries. The K-12 education industry spends the least.\" class=\"wp-image-114570\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0-932x1024.png 932w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0-273x300.png 273w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0-768x844.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0.png 980w\" sizes=\"auto, (max-width: 932px) 100vw, 932px\"><\/figure>\n<figure class=\"wp-block-pullquote\">\n<blockquote>\n<p>In fact, 69 percent of employees are more likely to stay with a company if they experience great onboarding.<sup>4<\/sup><\/p>\n<\/blockquote>\n<\/figure>\n<p>Traditionally, HR teams have relied on physical documents\u2014such as a driver\u2019s license, birth certificate, or passport\u2014and in-person communications to verify a new employee\u2019s identity and credentials, a semi-manual process that can cause frustrating onboarding delays, flagging a potential concern given more remote, in-person, and hybrid options available in a competitive labor market. The modern workforce expects a more automated experience that\u2019s also more secure. In fact, 82 percent of study participants wish there was a better way to perform verification.<\/p>\n<p>Fortunately, recent advances in technology are making it possible to digitize identity information in a way that\u2019s portable and privacy-respecting for the user, while helping businesses streamline their verification processes. This new technology, called verifiable credentials, is based on a decentralized identity approach and allows organizations to verify an individual\u2019s credentials, such as employment or education. For the background check process, employers can confirm a new hire\u2019s identity information digitally and within seconds from an authoritative source. The business can then issue an employee ID as a verifiable credential, which the employee can store in their digital wallet and use to access other resources that require employment confirmation, such as benefits enrollment or equipment purchases.<\/p>\n<p>Although these modernization efforts must still align with government regulations that require physical inspection of original documents, they have the potential to significantly transform the employee\u2019s onboarding experience and their first days on the job, making it easier for them to access the resources they need to be immediately productive in their new role.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/entra\">Microsoft Entra Verified ID<\/a> will help streamline the process of credential attestation, reducing frustration and delays that HR, IT, and new employees currently experience. The chart in Figure 2 illustrates a transformed onboarding journey, and how HR and IT manage both pre-onboarding (blue) and onboarding (green) to ensure the process runs smoothly for the employee.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"781\" height=\"574\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture2-6286ad323a6a0.png\" alt=\"Verifiable credentials help streamline the onboarding process. This chart shows how easy it can be to securely onboard a new employee using Microsoft Verified ID.\" class=\"wp-image-114573\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture2-6286ad323a6a0.png 781w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture2-6286ad323a6a0-300x220.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture2-6286ad323a6a0-768x564.png 768w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\"><\/figure>\n<p>As we all know, first impressions matter. By simplifying and expediting the onboarding experience, using verifiable credentials can help create a positive first impression that helps make employees feel good about joining an organization, rather than second-guessing their decision.<\/p>\n<h2>Increased risks of employee offboarding<\/h2>\n<p>When an employee leaves an organization, their access credentials\u2014along with their access permissions\u2014should be wiped clean to prevent valuable company information from walking out the door with them. Using modern identity governance tools such as verifiable credentials, IT can select one box to decommission a departing employee\u2019s access to the organization\u2019s digital assets. If HR tools are integrated with identity systems, then any changes HR makes in their systems automatically perpetuate to other IT systems, and vice versa.<\/p>\n<p>The offboarding governance process may include revoking any employer-issued verifiable credentials used to grant access to organizational programs, such as employee discounts, or employee-only resources. Verifiable credentials also give employees a new level of control over their personal information. They can revoke permissions they\u2019ve given their former employer to access verifiable credentials that share educational history, government-issued identity numbers, and other sensitive data. And with the introduction of Microsoft Entra Verified ID, it\u2019s now possible to allow individuals, organizations, and devices to decide what information they share with whom, and to take it back if necessary.<\/p>\n<h2>The benefits of using verifiable credentials<\/h2>\n<p>According to the 2021 Employee Experience Survey Highlights, organizations that provide digitally transformed experiences are nearly three times more likely to report higher productivity than their industry peers, and 90 percent more likely to report lower annual turnover.<sup>5<\/sup><\/p>\n<p>Using verifiable credentials creates tangible benefits for HR and IT departments and the employees they support:<\/p>\n<ul>\n<li><strong>Faster, easier, and less expensive processes.<\/strong> HR can start replacing some paper-based or in-person identity or credential verification processes to reduce onboarding time and get new hires productive sooner. IT can easily integrate verifiable credentials into existing systems without writing any custom code.&nbsp;<\/li>\n<li><strong>Compliance with ever-changing global privacy regulations.<\/strong> IT can implement decentralized identity solutions based on open standards that allow HR to verify an employee\u2019s skills, certifications, education, and career history in a privacy-respecting manner.<\/li>\n<li><strong>A better employee experience that strengthens recruiting and retention.<\/strong> Today\u2019s employees expect easy, convenient, and contactless digital experiences that protect their privacy. Verifiable credentials provide a secure way for individuals to share their personal information with their employers and revoke access when they leave.<\/li>\n<\/ul>\n<figure class=\"wp-block-pullquote\">\n<blockquote>\n<p>Avanade, a leading professional services and technology provider, is using Microsoft Azure Active Directory (Azure AD) verified ID to streamline credentialing processes and facilitate collaboration among employees, vendors, and clients.<\/p>\n<\/blockquote>\n<\/figure>\n<h2>Navigating the path ahead<\/h2>\n<p>The Great Reshuffle is the living, evolving proof that organizations need to pay closer attention to the employee experience. HR and IT business leaders must therefore respond to employee expectations for flexibility, safety, security, and support for their overall wellbeing. This response must start with a smoother onboarding process, in which verifiable credentials can significantly simplify and streamline.<\/p>\n<p>Learn more about how Microsoft and <a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access-management\/verifiable-credentials\">verified ID<\/a> can help your organization navigate the Great Reshuffle.<\/p>\n<p>Read more information on the solution and open standards initiative with <a href=\"http:\/\/aka.ms\/ownyouridentity\">decentralized identities<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator is-style-wide\">\n<p><sup>1<\/sup><a href=\"https:\/\/ms-worklab.azureedge.net\/files\/reports\/2022\/pdf\/2022_Work_Trend_Index_Annual_Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Work Trend Index: Annual Report<\/a>, Microsoft. March 16, 2022.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/worklab\/work-trend-index\/great-expectations-making-hybrid-work-work\">Great Expectations: Making Hybrid Work&nbsp;<em>Work<\/em><\/a>, Work Trend Index 2022, Microsoft. <\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/ms-worklab.azureedge.net\/files\/reports\/hybridWork\/pdf\/2021_Microsoft_WTI_Report_March.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">The Next Great Disruption Is Hybrid Work \u2013 Are We Ready?<\/a>, Work Trend Index 2021, Microsoft. March 22, 2021. <\/p>\n<p><sup>4<\/sup><a href=\"https:\/\/www.shrm.org\/resourcesandtools\/hr-topics\/talent-acquisition\/pages\/dont-underestimate-the-importance-of-effective-onboarding.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">Don\u2019t Underestimate the importance of good onboarding<\/a>, SHRM. 2017.<\/p>\n<p><sup>5<\/sup><a href=\"https:\/\/www.wtwco.com\/en-US\/Insights\/2021\/07\/2021-employee-experience-survey\">2021 Employee Experience Survey<\/a>, WTW. July 20, 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/31\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Verifiable credentials may help improve employee experience, an important factor HR and IT business leaders must pay attention to as expectations evolve.<br \/>\nThe post Streamlining employee onboarding: Microsoft&#8217;s response to the Great Reshuffle appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46896,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,6696,9060],"class_list":["post-46895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-identity-and-access-management","tag-identity-and-access-management-series"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-31T13:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0-932x1024.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle\",\"datePublished\":\"2022-05-31T13:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\"},\"wordCount\":1336,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png\",\"keywords\":[\"Cybersecurity\",\"Identity and access management\",\"Identity and access management series\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\",\"name\":\"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png\",\"datePublished\":\"2022-05-31T13:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png\",\"width\":932,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/","og_locale":"en_US","og_type":"article","og_title":"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-31T13:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Picture1-6286accb561f0-932x1024.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle","datePublished":"2022-05-31T13:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/"},"wordCount":1336,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png","keywords":["Cybersecurity","Identity and access management","Identity and access management series"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/","url":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/","name":"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png","datePublished":"2022-05-31T13:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle.png","width":932,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/streamlining-employee-onboarding-microsofts-response-to-the-great-reshuffle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Streamlining employee onboarding: Microsoft\u2019s response to the Great Reshuffle"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46895"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46895\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46896"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}