What Is Involved With A Lock-down Procedure?

When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.

 We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.

In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;

  • Firewall administrator access
  • Domain name registration accounts
  • Email and web hosting accounts
  • All remote access and VPN software
  • Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
  • All online, cloud, or hosted services
  • Let all employees know about the change, even the branch offices!
  • Encryption keys and passwords for backups
  • Remove them from all internal email distribution lists
  • Access control and security systems

Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.

When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.

If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.

At White Mountain, we make changing IT Service vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

How to Prepare Your Business for Any Form of Disaster

Assessing Your Data Backup Needs To kickstart your disaster recovery strategy, it is crucial to assess your data backup needs. This involves identifying the types of data you possess, their importance to your operations, and the frequency at which they change. Conducting a thorough data audit will enable you to prioritize your backup efforts and allocate resources effectively. Implementing a Rob...

Is Your Organization Prepared to Invest What is Needed into Cybersecurity?

Safeguarding your business' infrastructure from various threats is a well-known imperative. In discussions about network security, the term "endpoint" frequently arises. Exploring the significance of securing all endpoints is the focus of today's article. Commencing with an elucidation of what constitutes an endpoint, we define it as "any device connected to a network capable of serving as a po...

Comprehensive Cybersecurity Starts With These Actions

The effectiveness of your business' IT security heavily relies on the functionality of your IT operations. Ensuring that your staff understands their role in safeguarding your business assets is imperative. Let’s delve into the essential priorities for establishing a robust security training platform—an indispensable element in fortifying your business' IT defenses. Evaluate and Improve Your Se...

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...