Introduction
Hiring is exciting, but firing or resignation is stressful. In the chaos of an employee leaving, IT security often falls through the cracks. "Zombie accounts" are active accounts belonging to former employees, and they represent a massive security risk. A disgruntled former staffer with active access can do irreparable damage in minutes. You need a formalized, rapid IT Offboarding Checklist.
The Zero Hour Cutoff
Timing is everything. You need a coordinated plan where HR notifies IT of the exact moment termination occurs. At that "Zero Hour," a cascade of actions must happen simultaneously. It is not just about locking their email. It is about revoking access to the CRM, the file server, the VPN, and third-party apps like Slack or Zoom.
The Remote Wipe Protocol
In a remote work world, you cannot physically take the laptop immediately. You need a protocol to secure corporate data on devices that are still in the employee's living room. This involves issuing remote lock commands that render the laptop unusable until it is returned, and remotely wiping company data from mobile devices.
Your Offboarding Checklist
• Disable vs Delete: We disable the account first so we can preserve emails and files for legal reasons or knowledge transfer. Deleting it immediately destroys evidence and work history.
• Forwarding: Set up email forwarding so clients do not get a bounce back message, ensuring business continuity.
• License Recovery: Reclaim expensive software licenses so you are not paying for a seat nobody is sitting in.
Conclusion
A clean break is the best break. A rigorous technical offboarding process protects your data, your reputation, and your peace of mind when an employee moves on.