>Hi.
>One of our clients suspects that his IT person is about to leave and is concerned that
> he will be left vulnerable.
>The IT guy lookas after all Hardware, Email, Remote Comms etc.
>The Client wants a check list / Question and answer sheet as to the
> key bits of info that should be available, so that he can get
> this form IT guy before he leaves.
>
>I would apprciate suggeastions of a Check List type document
>Regards,
>Gerard
If I were the employer,
- Hardware Inventory
- Software Inventory
- Network Diagram
- Accounts/Passwords - systems, email, routers, etc.
- Communications - modems, phones, VPN, etc.
- Backups (if any) - test, test, test.
as a start. Expand the list as fits the current configuration.