FlexITechs Logo
CALL US
302-537-4198
Ocean View, DE 19970
  • Home
  • Managed IT Services
  • Managed Security
  • Managed Backups
  • Services
  • Blog
  • Testimonials
  • About
  • Contact

Off-Boarding Employees

May 25, 2023 by Eric Magill

It happens to every business that has employees. At some point an employee will leave for a variety of reasons including retirement, striking out on their own, health reasons or what they perceive to be a better opportunity at another company.

One interesting look at turnover rates comes from a study of employees changing their employers on LinkedIn. It found that 11 percent of employees posted new employers on their LinkedIn Profile during the 12-month period of their study in 2021 and 2022.

That doesn’t surprise me. In fact, judging by the number of LinkedIn profiles of employed people who still advertise their availability, I believe the number could be higher than 11 percent.

So, accepting that you will have turnover, how do you safely off-board those who leave from an IT standpoint?

The following technology off-boarding checklist will help mitigate the risk of losing valuable corporate knowledge and business in the departing employee’s transition.

Knowledge Loss
Be sure to query the departing employee about specific knowledge of their job that might not be in company manuals and procedures.
If involved in Sales, be sure the departing employee provides all contact information for Customers and Leads.

Social Media accounts
Change or delete the employee’s accounts on all Social Media.

Application logins
Change / disable / delete the employee’s login credentials on all Cloud and Desktop applications.

Email logins and forwarding
Change / disable / delete the employee’s Email login credentials.
Set up forwarding of the employee’s emails to someone else within the organization until customers become aware of the replacement.

Company Device Recovery
If the employee uses company devices such as Smart Phones or Tablets, recover the devices.

Recovering Data from Personal Devices
If the employee used his / her own devices, recover all company information from those devices.

Revoking Access
Disable / Delete access to the devices, applications, files and databases the employee accessed over the corporate network.
Revoke access to the physical building(s).

For help setting up an Off-Boarding Policy for your company, contact me at 302-537-4198, ericm@flexitechs.com, or on our Contact form.

Filed Under: Cyber Security, Managed IT Services, Social Media, Uncategorized, Workstations Tagged With: cybersecurity, employees, off-boarding

Share:

Beat Password Fatigue With a Password Manager

September 9, 2021 by Eric Magill

By now, in 2021, you’ve most likely experienced at least one breach of an account password whether you know it or not.

Perhaps the fallout didn’t prove devastating, but could there be a time bomb lurking in that stolen password that could cause significant harm?

The answer lies in our use of a small number of passwords for a large number of login credentials. From online shopping and banking to social media to personal accounts like the local library, we use the same passwords over and over and over again.

Thus, while we often think to change the password on the breached account, we don’t often think about changing it on every single account that uses that password as well, and we certainly don’t think to change all of our passwords on a regular basis.

To do so would require spending hours to determine which other user accounts we use that password on and hours more to change them all on a regular basis.

Cyber criminals knows this and take full advantage of our password fatigue to try to break into more sensitive accounts once they steal a password themselves or purchase a breached password.

To corral the password monster, you should use a password manager. A password manager at a minimum should encrypt your passwords, generate complex passwords, warn you if a password isn’t complex enough, and be set to require passwords to change regularly.

Other Password Manager Considerations:

  • Automatic Logins
  • Web Browser Extension to manage web site credentials
  • Security Audit that scores your overall password strength
  • Alerts for weak and re-used passwords
  • A Dark Web data breach monitor to alert you when credentials have been caught up in a data breach
  • Secure storage of identity and payment information for online forms
  • Temporary Clipboard storage of copied passwords

If you suffer from password fatigue, contact us at FlexITechs to learn more about our password manager, which meets all of the above features.

Call us at 302-537-4198, email me personally at ericm@flexitechs.com, or submit our Contact form.

Filed Under: Cyber Security, Managed IT Services Tagged With: cybersecurity, passwordmanager, passwords, passwordsecurity

Share:

Regularly Test Your Backups

January 24, 2021 by Eric Magill

If you have a Managed IT Services Provider like FlexITechs, chances are good your backups are not only being monitored for failures but also being tested on a regular basis to ensure that files restore successfully when needed.

There would be nothing worse than finding out after a natural disaster, a fire, or a Ransomware attack that has encrypted all of your files that your backups either were failing or that they won’t restore properly.

If testing your backups was not discussed when you signed up for an automated backup plan or you simply don’t know if they are being tested, ask your backup provider or backup software company if they are being tested and if not, how to do this.

In general, to test your backups, perform the following procedures:

  • At least once a month, pick a random backup date and restore a handful of files to see if they restore successfully (be careful not to restore over the current version of those files)
  • At least once a quarter, perform a deeper restore operation of numerous files from different backup dates, again being careful not to overwrite the current versions of your files
  • At least once a quarter, check all files in the most recent backup to be sure that you are backing up all files that you would need to restore
  • On a daily basis monitor your backups for failures. Any good backup software will let you know whether the backup succeeded or failed with an email or within the software itself
  • If you see errors at any stage of the backup or restore processes, resolve those issues or have your IT or backup service resolve them for you.

Keep in mind that if your data is critical to the operation of your business, you should perform the steps above more frequently to minimize the risk of partial or complete data loss when you need to restore from your backups.

For help implementing a backup testing program or an automated backup program if you don’t have one, call 302-537-4198 or email me personally at ericm@flexitechs.com.

Filed Under: Cyber Security, Managed Backups, Managed IT Services, Servers Tagged With: backups, cybersecurity, managedbackups, ransomware

Share:

Meet With Us!

Schedule an Online Meeting with FlexITechs to start lowering IT support costs and increasing productivity in your organization.

FOLLOW US

Recent Posts

  • Off-Boarding Employees
  • Microsoft 365 and Teams for Hybrid Workplaces
  • Two Monitors More Productive Than One?
  • Combatting Social Media Phishing Attacks
  • Financial Advantages of Managed Services for Small Businesses

Archives

  • May 2023
  • July 2022
  • June 2022
  • May 2022
  • February 2022
  • November 2021
  • September 2021
  • May 2021
  • March 2021
  • February 2021
  • January 2021
  • July 2019

Contact Us

FlexITechs Sidebar Form
Form to collect basic contact info and description of IT issues

Copyright © 2023 · FlexITechs