Support

support@partek.ca

Contact

(403) 488-3333

Support

support@partek.ca

Offboarding an Employee?

Here’s the Security Cleanup Most Businesses Miss.

Letting someone go is never easy. Whether it’s a smooth exit or a tense departure, the job isn’t over when you take back their laptop and reset their email password.

If you care about your company’s security, reputation, and data integrity, you need to go deeper — because chances are, they still have access. From synced apps on personal phones to auto-login credentials in browsers and forgotten integrations, ex-employees can retain backdoor access to your systems long after they’re gone.

Why Basic Offboarding Isn’t Enough

Most businesses do the obvious: reclaim company equipment and disable email accounts. But in today’s tech-driven environment, that barely scratches the surface.

Think about this:

  • Their phone may still have access to your email, CRM, and internal chat.

  • Their browser could still autofill logins to sensitive tools.

  • They might know (and still use) shared passwords — like your Instagram login or shared Google Doc folders.

  • Worse, they could still have access to calendar invites, project dashboards, or even building entry codes.

The cost of skipping a full offboarding process? Data leaks, brand damage, internal disruption, and in some cases, lawsuits

Your Employee Offboarding Security Checklist:

Use this step-by-step checklist every time someone leaves your organization — whether voluntarily or not.

 
Start with the Obvious:
  • Disable their company email and user accounts (Google/Microsoft/SSO)

  • Revoke access to synced platforms: Slack, Teams, Dropbox, Google Drive, CRM, project tools

  • Log out all active sessions across devices

  • Remove their device(s) from MFA settings (authenticator apps, SMS numbers, recovery codes)

  • Reset shared passwords: email inboxes, Canva, social media, scheduling tools

 
Then Audit What Most Businesses Miss:
  • Remove access from personal phones and tablets with company apps installed

  • Clear saved passwords and tokens in shared browsers or password managers

  • Unlink from shared calendars, drive folders, internal wikis, and collaborative docs

  • Check for app integrations or API tokens linked to their user credentials

  • Review shared inboxes, email forwarding rules, and any automation they set up

  • Remove them from informal team chats — like WhatsApp, Telegram, or Signal

  • Review physical access: building keys, door codes, ID cards, or security fobs

 
Document and Improve:

Every offboarding is a chance to tighten your process. Make it repeatable and secure:

  • Create a standard offboarding SOP

  • Assign roles (HR, IT, supervisor) for each offboarding step

  • Review quarterly for gaps or changes in your tech stack

 

💡 Pro Tip: Think Like a Hacker

Even if you trust the person leaving, the systems they touched might still pose a risk — either due to human error, negligence, or unknown access points.

The best way to protect your business is to treat every offboarding like a security exercise. What could they potentially still access? How could that affect your operations, clients, or compliance obligations?

Need Help Building a Proper Offboarding Strategy?

We help businesses like yours lock down sensitive access, build better offboarding procedures, and secure their systems from unnecessary risk. Let’s talk.