What Is Involved With A Lock-down Procedure?
When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.
We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.
In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;
- Firewall administrator access
- Domain name registration accounts
- Email and web hosting accounts
- All remote access and VPN software
- Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
- Any online services
- Let all employees know about the change, even the branch offices!
- Encryption keys and passwords for backups
- Remove them from all internal email distribution lists
- Access control and security systems
Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.
When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.
If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.
At White Mountain, we make changing IT Service vendors EASY!
- How to Balance Your IT’s Value Against the Cost No matter how you look at it, technology is expensive. You’ll rarely look at your IT invoices without cringing a little on the inside. However, it’s important that you take a glance at these every once in a while to understand just what you’re getting from your technology budget. Ultimately, you wan...
- Spend More Time Managing Your Business, and Less Managing Ve... Chances are, you most likely view your vendors as a necessary evil. While you have to work with them to get the things that your business needs to function, it’s hard to not think of everything else that could be accomplished in the time you spend dealing with them. Unfortunately, there are even mor...
- Would You Fall for this Adult Scam if You Saw an Old Passwor... As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are to handle them. To preface this scam, we need...
- Is It Safe to Have Your Browser Remember Your Passwords? Let’s be honest - not all of us have the best memories. This makes the ability for many browsers to remember our passwords seem like a godsend. However, is this capability actually a good thing for your cybersecurity? The answer may not surprise you. Nope! While yes, the fact that we no longer ha...
- IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...
- Co-Managed Services Can Help Build a Better Business Let’s say that your organization has experienced considerable growth over the past couple of years. It’s not outpacing your IT infrastructure, and the cracks are starting to show in more ways than one. This makes it difficult to plan for the future, implement new IT initiatives, and react to issues ...