When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.
We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.
In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;
- Firewall administrator access
- Domain name registration accounts
- Email and web hosting accounts
- All remote access and VPN software
- Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
- Any online services
- Let all employees know about the change, even the branch offices!
- Encryption keys and passwords for backups
- Remove them from all internal email distribution lists
- Access control and security systems
Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.
When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.
If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.
At White Mountain, we make changing IT Service vendors EASY!
- The Future of IT; 2019 is The Year Your Business Hires a Man... Chances are that if you are a business owner that has been in business for a decade you’ve seen how emerging technologies have changed the face of business. Technologies like cloud computing have opened up opportunities for many businesses to get the powerful computing infrastructures they need with...
- Help! My Staff Hates My Company’s IT! Fellow business owners, do you ever feel like you need to walk around on eggshells when it comes time to implement a new process or policy with your employees? Does it seem like your staff fights back tooth and nail when there is any technology change or IT restriction? You aren’t alone. More oft...
- Is Your Password Security Up to Par? Passwords are all over the place these days, whether they’re required to access an online account, or access the devices used to open these accounts. While both types of passwords can make for ideal security conditions, this is only the case if the passwords are strong. If your passwords can be gues...
- Google Pixel Is First to Come with Zero-Touch Provisioning--... Does your business use Google’s line of Android devices for business purposes? Well, you might be happy to hear about Google’s new zero-touch solution for enterprises for their Pixel line of smartphones. If you provide smartphones for your business’ employees, you know how much of a hassle it is to ...
- Your Employees Can Be One Of Your Biggest Security Risks A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when t...
- Your Business Needs To Manage Mobile Devices For The Sake Of... Businesses can benefit from the use of personal mobile devices in the workplace, yet there are also potential dangers in allowing mobile and Internet of Things devices to access your network. In order to reduce these dangers, you need to put some limits and guidelines on the use of such devices in t...