Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 103
ID Title Type Of Article
259 
Bay Dermatology Data-Center and Citrix Migration to 2X RAS on Data-Tech Cloud Services Case Study
577 
Access Health Care Physicians, LLC Internet Security and Performance Optimization Case Study
578 
Columbia Restaurant Group Migration Premise to the Cloud Case Study
579 
Data-Tech and Level 3 Communications Create Unique Partnership Case Study
580 
Managed Security Services recovers stolen medical equipment for client Case Study
581 
Property Management IT Services Increases Productivity for Realtor Case Study
582 
Hooters Hotel & Casino Las Vegas – Technology Upgrade and Rollup Case Study
583 
Aaneel Infotech VDI Programmers Project – How to use local USA resources and leverage oversees talent Case Study
584 
Data-Tech Provides Versa Managed Services for Tampa Gastro Group Case Study
585 
Seminole Hard Rock Casino – PCI Compliance for 5 years of data backup on tape Case Study
586 
QuickBooks Multi-Client Management Solution for Renaissance Consulting Case Study
587 
Voice over IP Phone System as a Business Management Tool Case Study
588 
Web Enable Applied Systems Technology Software and Consolidate Management Case Study
589 
Why is Data-Tech unique in an industry full of technology service providers? Case Study
590 
Tew and Associates Migration to Managed Services and Cloud Solution Case Study
591 
Data-Tech Chooses Kaseya Over Major Competitor After Three Month Evaluation Case Study
592 
Kaseya VSA Over Other Tools What it Means for Our Clients Case Study
593 
Emergency Services Turn to 3CX Voice Over IP Phone System after Hurricane Strikes Case Study
594 
The solution was extremely reliable and the process couldn’t be simpler. Case Study
595 
What value does Data-Tech bring to a Cloud Provider Partnership? Case Study
596 
Cyber Security and My Cloud Applications: Am I safe? Case Study
597 
Hyper-Converged Threat Initiative IT Security Strategy Case Study
598 
Dynamic Resource Allocation Strategy Workforce Management Case Study
599 
Consumption Marketing a function Consumption Economics: The New Rules of Marketing Case Study
309 
Florida Uniform Trade Secrets Act 2018 Company Policy
Add New  Records per page  1 of 5   
Engage Knowledge Base Web View         New Client          Print
Title Offboarding Checklist      
Resolution
Critical Information you should verify you have before an IT Transition, Recommendations, and Steps to take after transition.
 
Usernames and Passwords
Domain Administrator Accounts and Passwords
Local Administrator Accounts and Passwords
Peripheral (Firewall, Wireless Access Point, etc.) administrator accounts and passwords
List of any Premise based Appliances and/or Backup Devices and usernames and/or passwords
Website domain credentials
ISP agreement information
 
Network documentation
Hardware warranty paperwork
Hardware inventory list
Software license keys
Software packages deployed
Infrastructure diagrams
Third-Party Vendor Information
Credentials for any third party service
      • Camera Systems
      • Domain Registrar (Domain Registration)
      • Telephone Vendor
      • Any additional digital system credentials (you mentioned a lighting control system)
      • Contact information & account numbers
 
Recommendations:
1.  Document and Change any Online Portal Username and Passwords IT may have had access to
2.  Change your Security System Access Code
3.  Notify your Vendors of a pending IT Change
 
Immediately after:
1. Notify all employees of the transition so Previous can't call for access
2. Change your WiFi Security Code
 
Expectations during and after an Emergency IT Transition:
      • Potential Temporary Limited of loss of Remote Access
No Data or Email will be lost however access to email may be interrupted while lockdown occurs.
Vendor *
Web Link
Date Entered
You Tube Link
Type Of Article New Client
Article ID 273


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.