Blog

What Is Involved With A Lock-down Procedure?

When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.

 We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.

In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;

        • Firewall administrator access
        • Domain name registration accounts
        • Email and web hosting accounts
        • All remote access and VPN software
        • Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
        • All online, cloud, or hosted services
        • Let all employees know about the change, even the branch offices!
        • Encryption keys and passwords for backups
        • Remove them from all internal email distribution lists
        • Access control and security systems

Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.

When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.

If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.

At White Mountain, we make changing IT Service vendors EASY!

Thanks for visiting, we look forward to hearing from you.whitemtn contactus sm

LB signature

Related Posts

One of the reasons that information technology keeps changing is for the sake of the user and their convenience using it. However, if this convenience comes at the sacrifice of your business’ cybersecurity, it just isn’t worth it. This is the crux of...
Whether you love them or hate them, passwords serve an important purpose in the realm of cybersecurity. They are the first line of defense against potential threats, yet they are also notoriously easy to crack. Some of the biggest names in technology...
Simple passwords are often the bane of a business’ existence. If you routinely use strings like Password, 123456, Guest,  or Qwerty to secure an account, then you need to reexamine your password practices before they lead to a data breach. A goo...
Passwordless authentication has been increasingly spoken of in favor of the typical password-based method, and is gaining traction the more it is talked about. Google recently took steps toward passwordless that we felt warranted some discussion....
User authentication is a critical security feature for a business, specifically because it helps to minimize a significant threat to your business. This is why we’re so adamant that you should require multi-factor authentication wherever it is availa...
Passwords have been a primary data security measure since 1960, when MIT researcher Fernando Corbató suggested the practice—although even he is reportedly slow to take full credit. Why? Well, if you ask Corbató (and his contemporaries, who were the f...
Keeping a secure password is a little confusing these days, especially when the standards for what is an acceptable, complex password seem to keep shifting back and forth. Let’s take a look at some of the industry-standard best practices for password...
Most accounts these days require a password of some sort, and as such, the average user has countless of these codes that need to be kept both secure and top-of-mind. Some web browsers have built-in password management tools to help make them more us...
The password is the core element of both data security and user authentication. This makes the construction of them extremely important to protecting digital assets. Unfortunately, not everyone understands how to construct passwords that actually wor...
Protecting your online accounts, your data, and your customers’ information is now more important than ever. Industry and state-mandated compliances are now forcing businesses to tighten their cybersecurity, and it’s critical that every human being o...
Passwords… can be annoying, if we’re being honest. They are, however, also incredibly important to your business’ overall security strategy. We’ve all heard the suggestions on how to create secure passwords. As it turns out, there is more to modern s...
Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you....

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem NH and Portsmouth NH area.

White Mountain IT Services

 


33 Main St, Suite 302
Nashua, NH 03064

 


121 Riverfront Drive
Manchester, NH 03102

 

Client Help Desk      603-889-2210

New Client Inquiries   603-889-0800

Open Positions