What Is Involved With A Lock-down Procedure?

When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.

 We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.

In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;

  • Firewall administrator access
  • Domain name registration accounts
  • Email and web hosting accounts
  • All remote access and VPN software
  • Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
  • All online, cloud, or hosted services
  • Let all employees know about the change, even the branch offices!
  • Encryption keys and passwords for backups
  • Remove them from all internal email distribution lists
  • Access control and security systems

Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.

When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.

If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.

At White Mountain, we make changing IT Service vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...

Cyberthreats Threaten Your Entire Business

How Cyberattacks Imperil Your Business Cyberattacks manifest differently from other threats and yield a diverse array of consequences. They often involve attempts to infiltrate an organization's technology infrastructure with the intent to steal data, extract monetary gain, or extort business proprietors. As a result, business owners and managers are confronted with a host of distressing scenario...

Four Technologies You Can Use to Better Protect Your Data in Transit

Encryption Implementing strong encryption protocols works to secure data during transmission. From a technical point of view: SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols are commonly used to encrypt communication between a user's browser and a website. This added encryption ensures that any information exchanged is secure and cannot be easily intercepted by people looking to...

Comprehensive Cybersecurity Starts With These Actions

The effectiveness of your business' IT security heavily relies on the functionality of your IT operations. Ensuring that your staff understands their role in safeguarding your business assets is imperative. Let’s delve into the essential priorities for establishing a robust security training platform—an indispensable element in fortifying your business' IT defenses. Evaluate and Improve Your Se...