What Is Involved With A Lock-down Procedure?

When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.

 We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.

In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;

  • Firewall administrator access
  • Domain name registration accounts
  • Email and web hosting accounts
  • All remote access and VPN software
  • Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
  • All online, cloud, or hosted services
  • Let all employees know about the change, even the branch offices!
  • Encryption keys and passwords for backups
  • Remove them from all internal email distribution lists
  • Access control and security systems

Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.

When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.

If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.

At White Mountain, we make changing IT Service vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...

FTC Safeguards Gets a Crucial Update

What is the FTC Safeguards Rule? The FTC Safeguards Rule is a regulation that compels financial institutions under the FTC's jurisdiction to implement comprehensive measures to protect consumer data. The rule applies to a wide range of entities, including banks, mortgage lenders, credit unions, and other financial service providers. Its primary objective is to ensure that businesses establish and...

Critical Security Measures for Data Privacy

In an individual sense, at least, it?s relatively simple. You don?t want to share anything more than what you need to. However, there is also something to be said for security and its relationship with privacy, and whether or not you should sacrifice one to maintain the other. You don?t have to pick one; in fact, you should be using security to protect your data privacy. Today, we?re investigating...

Comprehensive Cybersecurity Starts With These Actions

The effectiveness of your business' IT security heavily relies on the functionality of your IT operations. Ensuring that your staff understands their role in safeguarding your business assets is imperative. Let’s delve into the essential priorities for establishing a robust security training platform—an indispensable element in fortifying your business' IT defenses. Evaluate and Improve Your Se...