Compliance

Offboarding Employees Safely: The Complete IT Checklist

20 March 2026·3 min read
Offboarding Employees Safely: The Complete IT Checklist

When an employee leaves your business, human resources processes are usually meticulously followed. But IT offboarding is frequently ignored.

An ex-employee who retains access to their email, your CRM, or your shared cloud storage long after their final day is an enormous security and privacy risk. Whether maliciously or accidentally, that lingering access can lead to costly data breaches. You must have an IT offboarding plan.


Immediate Identity Deactivation

On the employee's final day (or immediately upon termination), your IT team must follow this sequence to stop access in its tracks.

1. Reset the Primary Identity Password

If you use Microsoft 365 or Google Workspace, reset their password immediately. Then, hit the crucial "Sign out of all active sessions" button. This ensures that if they are currently logged in on a personal smartphone or home laptop, they are forcibly kicked out.


Managing Email and Shared Data

Once the primary identity is secured, you need to handle the data left behind and ensure long-term security.

2. Convert Email to a Shared Mailbox

You do not want to delete their email account, as you may lose important historical correspondence or miss future client emails. Convert their account into a "Shared Mailbox" and delegate access to their manager.


Revoking Application Access

Modern businesses use dozens of separate applications. Each one must be disconnected.

3. Revoke Third-Party SaaS Access

Not every app is tied to Microsoft. Consult your Password Manager and meticulously revoke access to every third-party application like Canva, Mailchimp, or company social media accounts.


Securing Personal Devices

If your staff use their personal phones to check work emails, you must use your Mobile Device Management (MDM) software to remotely wipe the corporate data partition from their phone. This ensures no client data goes home with them while leaving their personal photos and apps intact.


The Importance of Process

A rushed offboarding is a dangerous offboarding. If you rely on memory, you will forget to revoke access to a critical system. Standardise this list into a formal policy.

If you are struggling to manage access control or lack visibility into exactly what your former employees can still see, book a Cubit cyber security assessment today. We will review your offboarding procedures and provide a plain-English roadmap to tightening your access controls.

To understand where your business stands, we offer a free initial consultation - get in touch.

Free Download

The 10-Point Security Checklist for Australian SMEs

Based on real findings from 100+ cyber incidents. Check where your business stands.

Get the Free Checklist →

Stay sharp

Get practical security tips, monthly.

Plain English. No jargon. No spam. Unsubscribe any time.

Ready to protect your business?

Get a free, no-obligation security assessment quote tailored to your business.