We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Exciting News! Preferred Acquires Business System Solutions Grand Rapids Learn More
Toggle Bar

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prepare for Employee Turnover with a Foolproof Exit Checklist

b2ap3_thumbnail_turnover_checklist_tips_400.jpgOne of the most dreaded situations in the modern office is the resignation of experienced talent. It’s always sad to say goodbye to a colleague and friend… under the right circumstances. What would happen if an angry employee left your company and used their privileges to wreck havoc on your IT?

If you’ve taken proper precautions to ensure your former employees can’t sabotage your network and steal your data, you’re golden. However, this simply isn’t the case with a lot of companies, mainly because they don’t count on their former coworkers backstabbing them. This isn’t the entire issue at hand. Even if a former employee doesn’t intentionally take data from your business upon resignation, they could get hacked in the future, leaving sensitive data exposed. The best way to avoid employees walking off with corporate data is to take proper precautions, starting before they walk out your door.

Perform an Exit Interview
Besides getting the opportunity to discuss why they’re leaving the company, conducting an exit interview is a good time to iron out details that shouldn’t be left unchecked. This is a good time to talk about what accounts the exiting employee has access to, what devices they’ve borrowed from the company, important documents they might possess, and how to get in touch with them after they leave.

Take Back Any Company-Provided Devices
Once you’ve identified that your employee is indeed leaving the organization, you need to collect the devices they’ve borrowed from the company, like laptops, mobile devices, and storage devices like USBs or hard drives. This helps to ensure that you don’t let corporate data slip through the cracks. Collecting these devices ensures that you’re the one in control of your data, which mitigates the chance of the data being compromised, both voluntarily and involuntarily.

Promptly Change Email Passwords and Remote Access Accounts
For obvious reasons, you need to revoke access to their email accounts. This helps to prevent them from accessing information that they shouldn’t have access to following their departure from your company.

Change All Relevant Passwords
You never know just how many passwords an employee might walk out of your company with, especially if they’re saved in their personal mobile device’s browser cache or they use a password manager. This is why it’s important to make sure that all passwords are changed. If an employee were to get hacked, or decide that they don’t agree with their dismissal from your organization, it could put your data at risk of being compromised.

Wipe Mobile Devices
If your network can dish out security policies to mobile devices that gain access to company email, you will want to make sure you remotely wipe your accounts. This is something you would have needed to set up prior, but it prevents the user from walking away with their email in their pocket. Even if your former employee isn’t a threat, if the device is lost or stolen it could come back to bite you.

Warn Your IT
As always, you need to keep IT in the loop so they can keep an eye out for any suspicious activity concerning the former employee. In fact, your IT team should be entirely involved in the exit process to ensure that no stones are left unturned.

Overall, most of these steps are fairly obvious, but some businesses fail to follow through with them for a number of reasons. Some don’t have the resources, while others might simply forget one or two key steps when letting an employee go. Whatever your reason, Preferred can assist your team by providing the handiwork necessary to ensure your data is as secure as possible following the resignation of an employee. Give us a call at 708-781-7110 to learn more.

How Gamers Can Be an Asset to Your Business
AR Technology May Be an Adequate Substitute to “Fa...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, December 08 2025

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      For most law firms, compliance feels like a necessary headache, something you manage just to avoid penalties, not something that helps you win clients. But what if the very systems and safeguards you put in place to stay compliant could also become one of your strongest diff...

      Latest News

      Preferred Communication Systems Acquires Business System Solutions’ Grand Rapids Operations, Expanding Midwest Footprint

      GRAND RAPIDS, MI, UNITED STATES, December 3, 2025 -- Preferred Communication Systems (Preferred), a leading provider of Managed IT and Cybersecurity services headquartered in Chicago, Illinois, proudly announced the acquisition of Business System Solutions’ (BSS) Grand Rapids location.

      This strategic acquisition enhances Preferred’s presence in the Midwest and strengthens its commitment to helping small and mid-sized businesses achieve peace of mind and a better bottom line through technology.