top of page
Exit.jpg

Before You Let Go
Checklist

If you're preparing to part ways with your IT staff—especially your only IT person—this checklist outlines the most common critical systems and access points you must secure first. It’s essential to take control of your company’s digital assets, accounts, and infrastructure before any transition.

Make sure you:

  • Have direct admin access to key platforms (email, domains, cloud, backups, etc.)

  • Secure all business-critical credentials and recovery methods

  • Review and collect any IT documentation, network diagrams, vendor contracts, and internal procedures

 

This isn’t just about protection—it’s about business continuity and future-proofing your operations. Get your hands on everything you can now, while cooperation is still possible.

Top Priorities (Critical Business Control)

1️⃣ Admin Access to Email Services (e.g., Microsoft 365, Google Workspace)

  • Confirm ownership of global admin accounts

  • Ensure billing and recovery options are linked to company-controlled accounts

2️⃣ Domain & DNS Registrar Access (GoDaddy, Namecheap, Cloudflare, etc.)

  • Ensure company executives control domain settings

  • Verify access to DNS records to avoid outages

3️⃣ Admin Access to Business-Critical Applications

  • CRM, ERP, accounting software, inventory systems, etc.

  • Reset shared passwords and review API integrations

4️⃣ Admin Access to Cloud Services & Servers

  • AWS, Azure, Google Cloud, or on-premises servers

  • Confirm access to root/admin accounts and backup credentials

5️⃣ Admin Privileges in Active Directory / User Management Systems

  • Ensure at least one C-level executive has domain admin rights

  • Disable unused accounts and enforce MFA

High Priority (Security & Operations Stability)

6️⃣ Administrative Access to Telecom & Communication Services

  • Phone systems (VoIP, Zoom, Microsoft Teams, RingCentral, etc.)

  • Internet service provider (ISP) and network management portals

7️⃣ Access to Data Backups & Recovery Systems

  • Confirm full administrative access to cloud/local backups

  • Validate backup frequency and restore procedures

8️⃣ Admin Access to IT Remote Management & Security Tools

  • RMM (Remote Monitoring & Management) platforms

  • Endpoint security, antivirus, and patch management tools

9️⃣ Access to Password Management Systems (if used)

  • Ensure master access to tools like LastPass, Bitwarden, or 1Password

Other Critical Considerations (IT Dependencies)

 License Ownership & Software Subscriptions

  • Ensure licenses are under company ownership (not personal accounts)

  • Review auto-renewal settings and payment methods

 Firewall & Network Equipment Admin Access

  • Ensure access to firewalls, routers, and switches

  • Review and document network configurations

 Vendor & IT Service Provider Contracts

  • Review managed services agreements (MSPs, SaaS, hosting, etc.)

  • Identify any vendor dependencies on IT staff

bottom of page