Skip to main content
guides

What to Do When Your IT Person Quits

When your IT person quits, here's the step-by-step response: revoke access, audit systems, evaluate IT coverage, and document everything for next time.

Nandor Katai
Founder & IT Consultant
13 min read
What to Do When Your IT Person Quits

Your IT person just put in their two weeks — or left without much notice. You may not have a full picture of what they managed, what credentials they held, or how well your network is documented. Here's what to do, in order, starting today.

Stop and take a breath — this is fixable

A significant share of small businesses rely on a single IT person — a full-time employee, a part-timer, or a contractor who became the de facto everything-tech person over time. When that person leaves, the business doesn't collapse. What it does is expose how much critical knowledge was sitting in one person's head.

The risks here are real but manageable if you move in the right order. The order matters because some problems compound if you wait — an open account is riskier on day five than day one — while others can wait until you've done the urgent work first.

Think of this in two phases. The first is a 24–48 hour sprint to lock down access and establish what you're actually dealing with. The second is a slower, calmer process to figure out what kind of IT support your business actually needs going forward. By the time you've done both, you'll have a cleaner, better-documented IT environment than you probably had before.

We handle this call from clients several times a year. Every time, the business makes it through. The ones who do it smoothest are the ones who resist the urge to panic and instead work the list.


What Immediate Security Actions Are Needed When an IT Person Quits?

Revoke all administrative access across email, cloud platforms, and network hardware. Systematic access revocation prevents gaps from persisting after someone leaves.

Access revocation — do this today

Work through these systems in order. Don't skip any because you assume they didn't have access — verify each one and mark it done, assuming access exists until you personally rotate the credentials.

SystemWhat to DoWhy It Matters
Company email accountSuspend or disable the account — don't just change the passwordActive accounts can still forward or auto-reply even after a password change
Shared password managerRemove them from all vaults (1Password, Bitwarden, etc.), then rotate all shared credentialsRotating shared credentials is standard practice after any personnel change
Microsoft 365 or Google WorkspaceBlock sign-in immediately; wipe enrolled mobile devicesM365 admin center lets you block access in seconds; Google Workspace Admin Console → Users → Suspend
VPN accessRevoke their VPN credentials and remove any client certificatesOpen remote access credentials are easy to overlook and difficult to audit after someone leaves
Wi-Fi passwordsChange the main network password and any guest passwordsIf they had physical office access, they knew these
Router and firewall adminChange admin passwords for your router, firewall, and any managed switchesThese are rarely logged and easy to overlook
Domain registrarCheck GoDaddy, Namecheap, Cloudflare, or wherever your domain lives — verify who has admin access and update contactsDomain admin access should always be held by a company account to maintain full control

Access Revocation Dashboard

Assume access until you've verified otherwise

This is not an accusation — it's a security posture. Most former employees have no interest in accessing your systems. The risk isn't from malice; it's from doors that were left open by accident. Work through the list above with the assumption that every system is still accessible until you've changed the credentials yourself.

Shared accounts to audit

Beyond individual access, look for accounts that were set up in their name or tied to their personal email. This is often the messiest part of the cleanup.

  • Email admin (Microsoft 365 or Google Workspace) — confirm the admin account is not their personal email address
  • Domain registrar — the registrant contact and billing email should be a company address, not their personal one
  • DNS provider — if they managed DNS separately (Cloudflare is common), confirm you have login access
  • Website hosting and CMS — WordPress, Squarespace, Wix, or whatever you're using; verify you have admin credentials
  • Cloud backup and storage — Dropbox Business, OneDrive, Backblaze, or similar; check that the admin account is accessible
  • Security cameras and physical access systems — if you have door fobs or badge access, deactivate their credentials in the physical access control system
  • Apple Business Manager and MDM platforms — If your company manages iPhones, iPads, or Macs through Apple Business Manager, Jamf, or Microsoft Intune, verify that the admin account is registered to a company address — not their personal Apple ID or personal email. An MDM admin account tied to a personal account can leave enrolled devices unmanageable or locked if access is lost. These accounts are often overlooked entirely because they're not part of the Microsoft 365 or Google Workspace offboarding flow.

A critical step most checklists miss: multi-factor authentication. Changing a password is not enough if the former IT person also registered their personal authenticator app as the MFA method for critical accounts. Google Authenticator, Authy, and Microsoft Authenticator are tied to the individual device — not to the account's email address — so a password reset does not remove them. For Microsoft 365, go to Azure Active Directory → Users → select the account → Authentication Methods and review which devices are registered. For your domain registrar and any other admin account using MFA, check the security settings and remove any methods you can't confirm are company-controlled. This is the step most businesses miss, and it means a password reset alone doesn't fully complete the credential handover.

A note for regulated industries. If your business operates under HIPAA (healthcare), FINRA or SOX (finance), or a similar compliance framework, there's one step to take before you delete any account or wipe any device: export and preserve the access logs first. Under HIPAA, audit logs documenting who accessed or modified protected health information must be retained for a minimum of six years. Deleting an account before exporting its activity history could impair your ability to respond to a compliance audit. Pull activity logs from your email admin panel and cloud platforms before removing anything.

For the full access revocation checklist, including less-obvious systems like monitoring tools and line-of-business software, see our deeper guide on handling former employee access and security.


How to Build an IT System Inventory After Your Admin Leaves

Audit physical hardware, software subscriptions, network configurations, and backup schedules to identify every undocumented system they managed.

Once access is locked down, most small businesses hit the same wall: no documentation exists. Everything was in one person's head. That's fixable. Here's how to build a working inventory quickly.

Hardware. What physical equipment exists in the office? Walk the space and list: router, switches, network access points, NAS drives or servers, printers, cameras, any access control hardware. For each, note the make, model, and where the admin login lives (or doesn't).

Software and subscriptions. Pull the company credit card statement for the last three months. Every SaaS charge is a system someone was managing. Look for: Microsoft 365 or Google Workspace, any security or antivirus tools, backup software, line-of-business applications (accounting, project management, CRM), domain and hosting fees, and cloud storage. You'll find a few surprises.

Accounts and logins. What accounts exist, and what email address was used to create them? This is a critical audit area. If any business account was created with the IT person's personal email address — not a company address — you may be locked out of it until you contact the provider's support team.

Network configuration. Is there a firewall with custom rules? VLANs separating departments or devices? Static IP assignments for servers or printers? Log into your router's admin panel and take screenshots of whatever you can see, even if you don't fully understand it. This becomes valuable documentation later.

Local admin accounts. If your network includes physical servers or key workstations, check for local admin profiles that exist outside your cloud directory. These are accounts created directly on the machine — not synced from Microsoft 365 or Active Directory — and they're easy to forget about entirely. On Windows, go to Computer Management → Local Users and Groups to review what local accounts exist alongside the domain-synced ones. Look specifically for a generic "Administrator" account with a password the former IT person set, or any named account you don't recognize. Update the passwords on any you find, and disable any that serve no ongoing purpose.

Backup and recovery. Is anything being backed up? If so, where, and how recently? If you have a backup system — even a basic one — confirm it's actually running and that the last backup completed successfully. A backup that hasn't run in six months is a false sense of security.

A one-page spreadsheet with four columns — System, Who Manages It, Login/Account, Status — is enough to start. You don't need IT inventory software right now. You need visibility. If you want a structured template for this, our small business IT policy and documentation templates have a working version you can adapt in under an hour.

Not sure what you're actually dealing with?

If this inventory process surfaces more questions than answers — unknown devices on the network, active accounts you can't identify, or systems you don't recognize — our Business Security Score tool can help you map your exposure in about 10 minutes.


Should You Hire an IT Employee or Outsource to an MSP?

Choose your IT support model based on company size, daily support ticket volume, and whether your industry has compliance requirements.

Once the security work is done and you have a picture of what your IT environment actually looks like, you're ready for the bigger question: what kind of IT support does this business actually need? The answer comes down to three factors: the complexity of what your former IT person was managing, how often IT issues come up, and what you can realistically budget.

When hiring a replacement makes sense:

  • You have 20 or more employees and IT issues are a daily or near-daily reality
  • You have on-premise servers, specialized networking equipment, or data subject to compliance requirements (healthcare, legal, or financial firms)
  • The IT role was defined in your org chart, came with a salary, and consumed someone's full attention — meaning the scope was genuinely full-time

When outsourcing to a Managed Service Provider (MSP) makes more sense:

  • You have 5–25 employees and your IT needs are reactive rather than proactive — things break and someone fixes them, but you're not running a 24/7 operation that requires a technician on-site daily
  • You want predictable monthly costs instead of a salary, payroll taxes, and benefits
  • You want a team behind your IT rather than a single person — so that when your IT person goes on vacation (or quits again), you're not back in this situation

When a lighter-touch approach is enough:

  • Fewer than 10 employees, mostly cloud-based tools — Google Workspace or Microsoft 365, no local servers, no specialized hardware
  • IT needs are infrequent: a slow laptop, a printer that won't connect, a new employee who needs accounts set up
  • A part-time IT consultant or a pay-as-you-go break/fix arrangement may cover everything you actually need

IT Support Comparison Card

What does it actually cost? A 2026 comparison

For a 15-employee business, here's how the three models compare:

Support ModelTypical Annual CostWhat You Get
Internal IT employee$175,000–$235,000/yrOn-site, full organizational context; median salary $169,510 (Latest BLS Data) + ~35% benefits
Managed Service Provider$18,000–$31,500/yr$100–$175/user/month; team coverage and proactive monitoring
Part-time / break-fix consultant$3,600–$15,000/yrReactive only; no proactive monitoring or guaranteed response time

The MSP model typically costs one-eighth to one-tenth the equivalent of an internal hire at this size — and provides team redundancy that a single employee never can.

Be honest about your actual needs

The MSP model has real advantages for small businesses — but it's not right for everyone, and an MSP contract is not a guarantee that your problems disappear. A five-person law firm mostly using Microsoft 365 and Dropbox probably doesn't need a $1,500/month managed services retainer. A 22-person medical practice with an on-premise server, HIPAA requirements, and daily support tickets almost certainly does. Size your support to match the actual complexity of your environment.

For the full breakdown of when it's time to stop handling IT yourself and bring in professional help, see our guide on when to stop DIY IT.


What to look for when you bring someone new in

Whether you're hiring a new IT employee or evaluating an MSP, the questions you ask upfront determine whether you end up in a better position than before — or whether you're just replacing one undocumented setup with another.

If you're hiring a new IT employee

Ask for documentation samples. Not portfolio work — ask them how they document systems they manage. Do they maintain a runbook? Do they use a configuration management tool? If they look at you blankly, that's useful information. You want someone who treats documentation as part of the job, not an afterthought.

Clarify tool familiarity. Microsoft 365 administration is a different skill set from Google Workspace. Your line-of-business software (legal case management, medical billing, point-of-sale) may have specific integration requirements. Don't assume general IT competence translates to familiarity with your specific stack.

Expect a security audit in week one. Any competent new IT hire should want to do a walkthrough of your environment early — not to criticize what came before, but because they can't support what they don't understand. That assessment is how they'll find the Shadow IT you missed in your inventory.

If you're evaluating an MSP

A network audit should be part of onboarding. Ask every MSP you evaluate: "What does your onboarding process look like?" The right answer includes an initial assessment of your environment before they start billing for monthly management. If they want to skip this and just hand you a contract, keep looking.

Read the scope of work carefully. MSP contracts commonly exclude things that clients assume are covered: end-user training, hardware procurement, vendor escalations for third-party software. Before signing, go through the included/excluded services line by line.

Ask about response time SLAs. What's the response time for a server that's down versus a workstation that won't print? These should be defined commitments, not general assurances. "We respond fast" is not an SLA. "Critical issues: 4-hour response, routine tickets: 1 business day" is.

Ask for references from similar businesses. An MSP that primarily serves 100-person corporate clients may not be the right fit for a 12-person professional services firm. Ask specifically for references from clients of similar size and in a similar industry.

For a complete checklist of what to audit when you bring new IT support on board — including the security gaps a new provider should surface in their initial assessment — see our mid-year security audit checklist for small businesses.

Red flag: no initial assessment

If an MSP or IT contractor isn't interested in doing an initial walkthrough of your environment before taking over management, that's a meaningful red flag. Either they're going to manage your systems blindly and bill you for it, or their onboarding process is so templated that they're not actually looking at what you have. The ones worth working with want to know what they're signing up for.


One thing to do now that future-proofs everything

The reason this situation feels more disruptive than it needs to be is straightforward: it's not the departure that creates the problem. It's the absence of documentation.

Whoever manages your IT next — a new employee, an MSP, or a part-time consultant — make sure the critical information doesn't live only in their head. That's the single change that prevents you from being here again in two years.

A minimal IT runbook doesn't need to be elaborate. This is a working document, not a technical specification:

ItemWhat to DocumentWhere to Store
Network diagramA simple diagram showing your router, switches, access points, and any servers — even hand-drawn is fineCompany password manager, shared with ownership
Hardware inventoryMake, model, management URL, and admin credentials for every network deviceCompany password manager
Software and subscriptionsAll SaaS tools, license counts, renewal dates, and the account email used to manage themCompany password manager or shared spreadsheet
Backup scheduleWhat's being backed up, where it goes, how often, and who verifies that it ranWritten into a monthly check-in calendar
ISP account infoYour internet provider's account number, the tech support line, and your contract termsCompany password manager
Who to callList of vendors with contact info: ISP, domain registrar, hardware support contactsShared document accessible to ownership

IT Runbook Master Documentation

Store all of this in a shared business password manager — not in the IT person's personal vault. 1Password Teams, Bitwarden for Business, or a similar shared vault means that the credentials and documentation belong to the company, not to the individual who set them up.

Losing your IT person is genuinely disruptive. But it's also one of those rare moments where the disruption forces a conversation the business probably should have had anyway. The documentation habit you build now — shared credentials, a one-page runbook, a clear picture of what runs your business — is exactly what separates a business that handles future transitions smoothly from one that finds itself back in the same reactive position.

Work through the list, get the documentation in place, and the next IT transition your business faces will be a planned handoff instead of an unplanned scramble.


Frequently Asked Questions

If your company had a Mobile Device Management (MDM) system in place, an admin can remotely wipe the corporate data partition from the device without touching personal data. Without MDM, you're in a harder spot — your options are to ask them to return or wipe the device voluntarily, or consult an employment attorney if the data is sensitive. Going forward, a clear BYOD (Bring Your Own Device) policy and MDM enrollment should be a day-one requirement for any device accessing company systems.

Start with your company credit card statement. Every charge tied to a SaaS tool or subscription is a system they may have had access to. Then go through your email domain admin — most platforms send password reset confirmation emails to the account owner, so you can cross-reference from there. If you used a shared password manager like 1Password or Bitwarden, check the vault for any items they created or had access to as a vault member.

Yes, and most departing employees are willing to help if asked professionally and promptly. If they gave notice, use that time to have them document everything they manage — credentials, system configurations, vendor contacts, and anything in their head that isn't written down yet. If they've already left, a brief paid consulting arrangement is a reasonable ask. Most people are happy to do a few hours of knowledge transfer for fair compensation.

Statistically, the far greater risk is from accounts left open by accident — not intentional misuse. Most former employees don't go rogue. That said, 'assume access until verified' is the right security posture regardless of the person's character, because it removes the risk entirely. Complete the access revocation checklist promptly, and you've closed the exposure whether or not they ever intended to use it.

The first 24–48 hours are for access revocation — that's fast if you work through the checklist methodically. The inventory phase takes 2–4 hours for most small businesses. The hiring or MSP search takes longer: expect 2–6 weeks to find and onboard a replacement, whether that's a new employee or a managed services provider. The documentation habit — the part that protects you long-term — is an ongoing effort, but the foundation (a shared vault and a one-page runbook) can be in place within a week of getting your new IT support in place.

Topics

it staff turnoversmall business itemployee offboarding

Share this article

Nandor Katai

Founder & IT Consultant | iFeeltech · 20+ years in IT and cybersecurity

LinkedIn

Nandor founded iFeeltech in 2003 and has spent over two decades implementing network infrastructure, cybersecurity, and managed IT solutions for Miami businesses. He writes from direct field experience — every recommendation on this site reflects configurations and tools he has tested in real client environments. He is also the creator of Valydex, a free NIST CSF 2.0 cybersecurity assessment platform.