What Is Involved With A Lock-down Procedure?

When there is a change in IT Support staff that has access to your IT management systems and passwords it is important to quickly revoke access, change passwords review your security systems.

 We suggest having a lock-down procedure in place to guide you through the process and ensure that nothing is missed.

In addition to the obvious things like keys to building and passwords, here are a few other items to be sure you consider;

  • Firewall administrator access
  • Domain name registration accounts
  • Email and web hosting accounts
  • All remote access and VPN software
  • Change the Point of Contact records for all vendors like the phone company, internet provider, etc.
  • All online, cloud, or hosted services
  • Let all employees know about the change, even the branch offices!
  • Encryption keys and passwords for backups
  • Remove them from all internal email distribution lists
  • Access control and security systems

Of course, this is all much easier if you have professional IT management systems in place so that everything is fully documented before you need to change it.

When the only person who knows what to change, and how to change it is the one who just left, it can be a daunting task.

If you want help getting in front of this, before it becomes an emergency, or if you are currently in need of an emergency lock-down, give us a call.

At White Mountain, we make changing IT Service vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Ransomware is One Problem that Leads to Many More

The Simple Fact is that Ransomware Hurts in Many Ways Let?s walk through what a modern ransomware attack might look like, acknowledging all the ways that the affected business would suffer as a result of the infection. A ransomware attack begins with an attacker reaching out and communicating with an intended victim as part of a phishing attack to gain access to said victim?s device or networ...

Securing Your Wireless Network

Alter the Security Information on Your Router As with any account that is protected by a password, you will want to ensure that your router?s login information is changed to something much more secure than the default configuration that comes with the device. This is because any default credentials for router models can be found online and can easily be accessed by anyone that can use a Google se...

FTC Safeguards Gets a Crucial Update

What is the FTC Safeguards Rule? The FTC Safeguards Rule is a regulation that compels financial institutions under the FTC's jurisdiction to implement comprehensive measures to protect consumer data. The rule applies to a wide range of entities, including banks, mortgage lenders, credit unions, and other financial service providers. Its primary objective is to ensure that businesses establish and...

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...