Empowering Businesses Through Smarter IT
1860 SW Fountainview Blvd., Suite 100, Port St. Lucie, FL 34986

When An Employee Joins Or Leaves, What Should IT Do?

Share This Post

Most small-business breach reports trace back to one of two avoidable problems: a new hire who got too much access on day one, or a former employee whose accounts were still active months after they left. Both are failures of the same workflow, the seam between HR and IT.

Onboarding and offboarding feel like HR work. The security half belongs to IT, and on most small business teams nobody owns it end to end. That gap is where unauthorized access starts, and it is also one of the easiest fixes once someone decides to make it a real process instead of an afterthought.

How Should A New Hire’s IT Access Be Set Up?

Provisioning a new account well takes about thirty minutes when the steps are documented, and three weeks of follow-up problems when they are not. The goal on day one is not to give someone everything they might ever need. It is to give them only what their role requires, with multi-factor authentication enforced before the first login, and a clean audit trail showing who approved what.

What should the day-one checklist include?

  • Creating the user account in the company identity directory, which for most small business stacks means Microsoft Entra ID or a similar identity platform.
  • Assigning the new hire to security groups based on their job title, not on whatever access a peer happens to have collected over the years.
  • Provisioning email and required SaaS applications through the identity directory, rather than logging into each tool and creating accounts one at a time.
  • Enrolling MFA before the new hire ever logs in, not after their first stressful week when they are tempted to skip it.
  • Issuing a company-managed device with full-disk encryption already enabled and remote-wipe tooling installed.
  • Documenting which manager approved each access grant in a ticket or shared log, so future reviews can trace the decision back to a person.

Why does role-based access matter from day one?

“Just give them what Karen has” is the single most common cause of access bloat in small businesses. Karen has been there four years and has collected access to dozens of systems she rarely uses. Cloning her account gives a brand-new employee the keys to all of it, including systems where the new hire has no business need at all. Define a handful of role templates such as front desk, account manager, technician, and accounting, then provision against those instead. The first time you do this it feels slow. Every subsequent hire takes a fraction of the time and ships with a defensible access profile.

Who Decides What Access Each Employee Needs?

Access decisions sit between three roles, and one of them usually drops the ball. The manager owns the business need and knows what the new hire actually needs to do their job. IT owns how the access is technically granted and which systems can talk to which. The employee owns nothing on this question. Without a clear handoff between manager and IT, requests get processed by whoever happens to read the ticket first, and one-time exceptions quietly become permanent.

A practical small business approach is to put tight access control across the systems your team uses into three layers: baseline access everyone gets on day one, role access tied to a job title, and exception access that requires manager approval and a written expiration date. The exception layer is the one most teams ignore, and it is also the one that quietly creates the long-tail access bloat you find on an audit.

What does a working access matrix look like?

A simple spreadsheet works at first, and an identity-directory feature works long term. Rows are roles, columns are systems and shared folders, and each cell is read, write, admin, or none. The matrix gets reviewed quarterly, not yearly, because small businesses change roles faster than annual reviews can keep up. A quarterly cadence also means fewer surprises when someone in finance suddenly needs vendor portal access that nobody documented.

What does least privilege look like in practice?

Least privilege is the principle that an employee should be able to do their job and nothing else. Practically, that translates into three habits worth building.

  • Default to no access. Grant only what is explicitly requested, with a stated business reason in the ticket.
  • Time-box temporary access. Project-based folder access should expire when the project ends, not linger for years.
  • Separate everyday accounts from admin accounts. Even on a small team, the bookkeeper should not be running day-to-day work from the same Windows account that has domain admin rights.

What Should Happen The Day An Employee Leaves?

Same-day offboarding is the gold standard. Same-week is the floor. Two weeks later is a breach waiting to be reported. The exact moment access is removed should be tied to the employee’s final scheduled hour, not to a Friday-afternoon cleanup ritual that may or may not happen the following month.

What does a clean offboarding checklist cover?

  • Disabling the user account in the identity directory at the agreed moment, not deleting it. Disabling preserves the audit trail and keeps email recoverable for legal and tax reasons.
  • Revoking active sessions across every connected SaaS app so a browser tab still logged in cannot keep doing work.
  • Forwarding inbound email to the employee’s manager for a defined window, typically thirty to sixty days, so client messages do not bounce.
  • Removing the former employee from shared mailboxes, distribution lists, calendar resources, and any group ownerships they collected.
  • Rotating shared passwords, certificates, and API keys the employee knew, including any service-account credentials they had access to.
  • Wiping any company-managed phone or laptop remotely, and retrieving the hardware before the employee leaves the building.

Why do offboarding delays come back later?

Credentials that should have been disabled the day someone left often surface months later as part of a credential-stuffing attack, or as old credentials surfacing on dark-web markets long after the employee themselves has moved on. The breach report rarely says “former employee.” It says “unauthorized access from a valid account.” That valid account is the one IT never disabled, and the company never noticed because nobody was watching that user anymore.

What about shared accounts?

Some small business systems still use shared logins, such as a single bookkeeper account or a single point-of-sale login that everyone on the floor signs into. The departing employee knew that password. Rotate it the day they leave, even if it is inconvenient for the team that is still there. A delayed rotation is the same as leaving the front door key on the sidewalk. Where possible, plan to replace shared logins with individual accounts before the next offboarding rather than after.

What’s The Biggest Risk Of Skipping This?

The headline risk is unauthorized access from a former employee, and it is a real risk that shows up in breach reports every quarter. The more common damage from sloppy onboarding and offboarding, though, is quieter. It is drift. Drift means current employees accumulate access they no longer need because nobody trims it back when their role changes. Drift means departing-employee accounts pile up in a “disabled” or “still active” limbo because nobody is sure if any of them can be deleted. Drift means an audit finds your company has thirty-seven user accounts and only nineteen current employees, and no one can confidently say which ones still need to exist.

What does the worst-case scenario actually look like?

A former employee uses their still-valid VPN or Microsoft 365 credentials weeks after leaving. They download a customer list, a pricing spreadsheet, or a signed contract. The first sign is usually a billing alert from an unexpected sign-in location, or a competitor showing up with very specific knowledge. By the time IT pulls the logs, the data is already out, and the response side of the work is now the active-incident playbook every small business needs rather than a quick five-minute fix.

How does this affect compliance?

HIPAA, PCI-DSS, and most cyber insurance applications all require documented access controls and timely access removal. If a regulator or an underwriter asks for proof that former-employee accounts were disabled within a defined window, “we usually get to it eventually” is not an answer they accept. A dated checklist with timestamps is the bar, and the same checklist also makes audit prep dramatically faster the next time renewal season rolls around.

Frequently Asked Questions About Employee Onboarding And Offboarding Security

How quickly should we disable a former employee’s accounts?

The same day they leave. For an unplanned termination, the same hour, and ideally before the conversation happens. For a planned resignation with notice, schedule the disable for the exact moment their final shift ends. Disabling is not the same as deleting. Disable first, then archive or delete on a longer timeline once legal, email-retention, and tax windows have passed.

Should we change shared passwords when an employee leaves?

Yes, every time, without exception. A shared password is only secret as long as every person who knows it still works there. Rotate the password the same day the employee leaves, even if it temporarily inconveniences the rest of the team. If a system supports it, use the next offboarding as the trigger to replace the shared login with individual accounts so you stop having to rotate at all.

Who is responsible for offboarding security, HR or IT?

Both. HR owns the trigger because they know who is leaving and when. IT owns the execution because they know how to actually disable each account and revoke each session. The handoff between them must be documented, not casual. A common small business mistake is HR notifying IT through a hallway conversation or a forwarded email. A ticket or shared form with a date, a person, and a sign-off field prevents missed offboardings.

What is a joiner mover leaver process?

It is a framework that handles three employee lifecycle events with the same rigor. When someone joins, they get a new account provisioned against their role. When they move to a different role, their access is reviewed and trimmed to match the new job, not stacked on top of the old one. When they leave, access is removed promptly. Most small businesses handle joiners and leavers but ignore movers, which is why long-tenured employees end up with stacked access from every role they ever held.

Do we really need MFA on every new hire from day one?

Yes. Adding MFA after the fact is harder than adding it on day one, because the employee has already built habits without it and will treat the rollout as a disruption. Day-one MFA also closes the highest-risk window for new accounts, which is the early period when a freshly created account exists but is not yet being actively used or watched. Brand-new accounts are a common pivot point in account-takeover attacks for exactly that reason.

Should we delete a former employee’s account or just disable it?

Disable first, delete later, after a defined retention window. Disabling stops the account from being used while preserving file ownership, email history, audit logs, and references in tickets or shared documents. Deleting too early can break ownership of files the team still needs, lose context that an investigation might require, and create gaps in compliance records. A practical pattern is disable on the day they leave, archive at thirty days, and full delete at twelve months unless legal asks for longer.

What if an employee leaves on bad terms?

Treat it as a high-risk offboarding. Coordinate the disable timing with HR so access cuts happen at the same moment the employee is informed of the decision, not minutes or hours later. Recover company hardware before the employee leaves the building if at all possible, and revoke any remote-access tokens, VPN profiles, and mobile device certificates as the conversation is happening rather than after.

Where Should You Start?

A short access review tells you most of what you need to know about how onboarding and offboarding are actually working today. Count the current employees, count the active accounts in every system, and look at the difference. Then audit the last three departures and check the disable timestamps against the actual final-shift dates. If those numbers do not match, the workflow is the problem, not the people.

If that gap looks ugly and you would rather have a partner bring it back into shape, a complete review of your cybersecurity posture is the right starting point. O&O Systems will document who has access today, build the joiner mover leaver process the team will actually follow, and stand up the disable checklist that gets executed every single time.