JMARK Blog

What to Do When Your IT Person Leaves

Written by Thomas H. Douglas | 4/17/26 1:49 AM

Your IT person just left. Whether they walked out, passed away, or departed under circumstances that can't be fully explained — the questions start immediately. Are my passwords secure? Who are my vendors? Are there backdoors in my network? What data is private?

It's a nightmare scenario. And it happens more often than anyone likes to admit. At JMARK, we've seen businesses at their lowest in exactly this situation — and we've brought them back. We're here to do the same for you.

What Now? The 4 Questions You Need to Answer Immediately

When an IT person leaves, four vulnerabilities rise to the surface fast:

1. Are my passwords secure? If your former IT person had access to administrative credentials — and they almost certainly did — those need to be changed immediately. Every system, every account, every access point they touched is a potential exposure.

2. Who are my vendors? IT relationships are often managed entirely by one person. When they leave, vendor contacts, contracts, and account credentials can walk out the door with them. Identifying every vendor relationship is a critical first step.

3. Are there backdoors in my network? A disgruntled or simply careless former employee may have left access points in your network that you don't know about. A thorough security audit is the only way to know for sure.

4. What data is private? Understanding what sensitive data exists in your environment — and who still has access to it — is essential for protecting your business, your clients, and your compliance standing.

The Game Plan: How JMARK Steps In

Without a roadmap, it's easy to waste time heading in the wrong direction. That's exactly where JMARK comes in. Our experience with these situations means we can move efficiently and decisively — even when we're jumping headfirst into the chaos.

To get started as smoothly as possible, have the following ready:

  • Network Topology
  • Domain Credentials
  • Firewall Credentials
  • Emergency Evaluation documentation

From there, our process is straightforward:

  1. Assemble a dedicated team to serve as your ongoing reference point
  2. Assess the situation and your specific needs
  3. Perform a full Network Evaluation
  4. Identify high-priority vulnerabilities
  5. Create a custom action plan

Every step is handled with care, flexibility, and trust — because that's the only way to do this right.

The JMARK Difference

For over 35 years, JMARK has been providing innovative managed IT services to organizations of all sizes. Through all of it, we've learned one thing above everything else: people come first. Always.

Whether we're fortifying your network security, navigating a former employee's hostility, or simply helping you figure out where to start — we're committed to giving you the peace of mind and time back to focus on what matters most.

Time is of the essence. Contact us now or call 844-44-JMARK to get JMARK on your side today.