Back to Blog
Commercial SecurityDecember 20, 20259 min readASAP Mobile Locksmith MD

How to Secure Your Business After an Employee Leaves

Firing an employee who had keys? You need more than just a lock change. Our commercial security checklist covers electronic access, master key systems, and liability protection.

You've just terminated an employee, and they had keys to your business. What now? If you think simply changing the front door lock is sufficient, you're leaving your business seriously vulnerable. Employee departures—whether voluntary or not—require a comprehensive security response that most business owners overlook.

After securing hundreds of Maryland businesses following employee terminations, we've developed a complete protocol that protects your assets, data, and liability. Here's everything you need to do.

Why Employee Departures Are a Critical Security Event

The statistics are sobering:

  • 60% of data breaches involve current or former employees
  • 25% of former employees admit they retained access to systems they shouldn't
  • Insurance claims for employee theft average $200,000
  • Most incidents occur within 30 days of termination
  • Your former employee knows:

  • Security vulnerabilities
  • Alarm codes
  • Safe locations
  • High-value inventory locations
  • Security camera blind spots
  • Employee schedules
  • Cash handling procedures
  • They may also have:

  • Physical keys
  • Access cards
  • Alarm codes
  • Digital access credentials
  • Proprietary information
  • Every hour you delay addressing these vulnerabilities increases your risk.

    Immediate Actions: First 24 Hours

    Time is critical. Take these steps immediately after termination:

    Hour 1: Lock Access

    Before the employee leaves the building:

  • Collect all physical keys
  • Retrieve access cards/fobs
  • Disable digital access credentials
  • Change alarm codes they knew
  • Reset safe combinations
  • Disable their IT access
  • Retrieve any company phones/laptops
  • Create a checklist during onboarding of everything you'll need to collect during offboarding.

    Hour 2-4: Access Audit

    Identify everywhere the employee had access:

  • Main entrances
  • Rear/side doors
  • Storage areas
  • Offices
  • File rooms
  • Cash registers/safes
  • Alarm systems
  • Computer systems
  • Cloud services
  • Security camera systems
  • Vendor accounts
  • Social media accounts
  • Use their access log (if you have one) to identify patterns. Where did they regularly go? What did they regularly access?

    Hour 4-24: Emergency Rekeying

    Call a professional commercial locksmith immediately to:

  • Rekey all locks the employee accessed
  • Reset electronic access controls
  • Reprogram master key systems
  • Update access logs
  • Test all changes
  • Do not wait until tomorrow. Employee theft most commonly occurs within 24 hours of termination when they're emotional and the business hasn't yet responded.

    Beyond Basic Lock Changes: Comprehensive Security

    Changing locks is just the beginning. Here's the complete security audit:

    1. Master Key Systems

    If your business uses a master key system (where some keys open multiple doors), you have a complex problem.

    The Challenge:

    If the employee had a master key, you can't just rekey one lock. Master key systems are hierarchically structured, and changing one key often requires rekeying the entire system.

    Options:

  • Full system rekey: All locks reprogrammed with new keys
  • Sub-master replacement: Less expensive, rekeys specific zones
  • Upgrade to electronic access: More control, better tracking
  • Cost Comparison:

  • Full master system rekey: $500-2,000 depending on size
  • Electronic access upgrade: $1,500-5,000 initially, but better long-term control
  • Doing nothing: Potential losses of $50,000+ if incident occurs
  • 2. Electronic Access Control Systems

    If your business uses card access or key fobs, you have more options but still need immediate action.

    Steps Required:

    1. Deactivate the employee's credentials (do this instantly from the system)

    2. Review access logs for the past 30-60 days

    3. Look for anomalies: After-hours access, unauthorized areas

    4. Check if they propped doors or violated protocols

    5. Reissue credentials for sensitive areas

    6. Update access levels for remaining staff

    Red Flags to Investigate:

  • Access at unusual times
  • Multiple rapid entries/exits
  • Access to areas beyond their role
  • Failed access attempts (testing their clearance)
  • Door-propped-open alerts
  • 3. Alarm Systems

    Immediate Changes:

  • Change all codes the employee knew
  • Update monitoring company contact list
  • Review recent alarm history
  • Check for disabled sensors
  • Test all entry points
  • Advanced Steps:

  • Review alarm activity logs for patterns
  • Verify no sensors were bypassed
  • Ensure cameras are functioning
  • Update duress codes
  • Consider upgrading to biometric access
  • 4. Safe and Cash Access

    If the employee had safe access:

    Required Actions:

  • Change safe combination immediately
  • Count all cash and compare to records
  • Review recent transactions
  • Update who has the new combination
  • Consider upgrading to digital safe with access logs
  • Financial Controls:

  • Conduct inventory count
  • Review recent deposits
  • Check credit card processing records
  • Audit expense reports
  • Review vendor accounts
  • 5. Digital Security

    Physical keys aren't your only concern. Digital access can be even more damaging.

    IT Security Checklist:

  • Disable all company accounts (email, software, cloud)
  • Change shared passwords they knew
  • Review file access logs
  • Check for recently copied/downloaded files
  • Audit email forwards or auto-replies
  • Remove from company social media accounts
  • Disable VPN access
  • Alert your IT provider
  • Check for backdoor access methods
  • Common Oversights:

  • Shared "admin" passwords
  • Service accounts (utilities, vendors)
  • Social media admin access
  • Google/Microsoft shared drives
  • Vendor portals
  • Point-of-sale systems
  • 6. Camera Systems

    Immediate Review:

  • Check recent footage of the employee
  • Verify cameras are functioning
  • Look for suspicious behavior leading up to termination
  • Ensure recording storage is secure
  • Change DVR/NVR passwords
  • Review remote access credentials
  • Employees who know they're about to be terminated sometimes sabotage cameras or create blind spots for later return.

    Special Considerations by Industry

    Different industries have unique vulnerabilities:

    Retail:

  • POS system access
  • Inventory management systems
  • Customer data
  • Vendor relationships
  • Cash handling procedures
  • Merchandise discount codes
  • Restaurants:

  • Opening/closing procedures
  • Supplier relationships
  • Recipe/proprietary information
  • Alcohol inventory
  • Customer reservation systems
  • Health inspection records
  • Medical/Dental:

  • HIPAA compliance issues (most critical)
  • Patient records access
  • Prescription systems
  • Insurance billing
  • Controlled substances logs
  • Medical equipment
  • Law Offices:

  • Client privileged information
  • Case files
  • Trust accounts
  • Confidential documents
  • Calendar/scheduling systems
  • Financial Services:

  • Client account information
  • Regulatory compliance records
  • Transaction systems
  • Vault access
  • Wire transfer capabilities
  • Each industry may have regulatory requirements for documenting access changes.

    Documenting Everything for Liability Protection

    Proper documentation protects you legally and for insurance purposes:

    Create a Termination Security Log:

  • Date and time of termination
  • Items collected (keys, cards, devices)
  • Locks changed (before and after photos)
  • Alarm codes reset
  • Digital access disabled
  • Who performed each action
  • Witness signatures
  • Maintain for Insurance:

  • Itemized locksmith invoice
  • List of all rekeyed locks
  • Access control system changes
  • Photos of collected keys/cards
  • Written confirmation from IT
  • Updated security procedures
  • If a theft or breach occurs, this documentation proves you took reasonable precautions and can be critical for insurance claims.

    The "Friendly" Departure Doesn't Change the Protocol

    Many business owners hesitate to take full security measures when an employee leaves on good terms:

    "She's been with us 10 years and left for a better opportunity. I don't want to insult her by demanding keys back immediately."

    Here's the reality:

  • Trust isn't a security strategy
  • Circumstances change
  • Keys get lost or stolen
  • Other people may have copied keys without permission
  • Your insurance may require documented key control
  • Liability doesn't care about good intentions
  • You can be respectful while being thorough. Explain it's standard policy for everyone, not personal.

    Prevention: Systems That Make Offboarding Easier

    The best time to prepare for employee departure is during employee onboarding:

    Key Control System:

  • Key checkout log with signatures
  • Numbered keys with tracking
  • No duplication allowed (restricted keyways)
  • Regular audits of who has what
  • Clear policy in employee handbook
  • Electronic Access:

  • Role-based access (only access what they need)
  • Automatic audit trails
  • Scheduled access reviews
  • Easy revocation process
  • No shared credentials
  • Digital Security:

  • Password manager for shared accounts
  • No personal devices for business access
  • Regular security training
  • Exit procedure checklist
  • IT automatically notified of terminations
  • Legal Protection:

  • Confidentiality agreements
  • Non-compete clauses (where appropriate)
  • Clear security policies
  • Acknowledged security training
  • Exit interview security checklist
  • Warning Signs of a High-Risk Termination

    Some terminations carry higher security risks:

    Elevated Risk Factors:

  • Employee was fired for theft or dishonesty
  • They made threats during termination
  • They have substance abuse issues
  • They're facing financial problems
  • They expressed resentment toward the business
  • They had unusual access or knowledge
  • They're going to a competitor
  • Legal action is involved
  • Additional Measures for High-Risk:

  • Increase security presence temporarily
  • Alert security company for extra monitoring
  • Notify local police (if threats were made)
  • Secure valuable assets
  • Increase camera monitoring
  • Consider legal restraining order
  • Alert employees to be vigilant
  • Change more systems than usual
  • Cost vs. Risk Analysis

    "This seems expensive. Is it really necessary?"

    Let's look at real numbers:

    Cost of Comprehensive Security Response:

  • Emergency rekey service: $300-800
  • Electronic access changes: $200-500
  • IT security review: $300-500
  • Updated alarm codes: $100-200
  • Total: $900-2,000
  • Cost of Not Responding:

  • Average employee theft: $200,000
  • Business interruption: $50,000-500,000
  • Legal fees: $10,000-100,000
  • Reputation damage: Incalculable
  • Insurance premium increases: 20-50%
  • Potential total: $260,000-$800,000+
  • The security response costs less than 1% of potential losses. It's not an expense—it's insurance.

    What Professional Commercial Locksmith Service Provides

    When you call ASAP Mobile Locksmith MD for post-termination security:

    Our Process:

    1. Emergency Response: Often same-day service

    2. Security Audit: Identify all vulnerabilities

    3. Prioritized Action Plan: What to change first

    4. Comprehensive Rekeying: All affected locks

    5. Master Key Restructuring: If applicable

    6. Documentation: Complete records for your files

    7. Employee Training: How to use new keys/systems

    8. Follow-up: Verify everything works properly

    What We Provide:

  • Licensed commercial locksmith service
  • Experience with all commercial lock types
  • Master key system expertise
  • Electronic access integration
  • After-hours emergency service
  • Written security recommendations
  • Compliance documentation
  • Ongoing support
  • Timeline Recommendations

    Immediate (Within 2 hours):

  • Collect physical keys and access cards
  • Disable digital credentials
  • Change alarm codes
  • Same Day:

  • Rekey critical locks (main entrance, offices with sensitive data)
  • Change safe combinations
  • Review security logs
  • Within 48 Hours:

  • Complete full rekey of all accessed areas
  • Update master key system if needed
  • Full IT security audit
  • Document all changes
  • Within One Week:

  • Review and update security policies
  • Train employees on new procedures
  • Complete inventory and financial audit
  • Consider system upgrades
  • Your Action Plan Right Now

    If you're reading this because you just terminated someone:

    Stop and do these things immediately:

    1. Call your locksmith: (410) 590-9844 - We provide same-day commercial rekeying

    2. Call your IT provider: Disable all digital access

    3. Change alarm codes: Do this yourself right now

    4. Alert managers: Make them aware of increased vigilance

    5. Document everything: Start your security log now

    If you're reading this for future planning:

    1. Create an offboarding checklist now

    2. Audit current key control practices

    3. Consider upgrading to electronic access

    4. Train managers on security protocols

    5. Save our number for future needs

    Serving Maryland Businesses

    ASAP Mobile Locksmith MD provides comprehensive commercial locksmith services throughout Maryland, including:

  • Glen Burnie
  • Crofton
  • Baltimore
  • Annapolis
  • And all surrounding areas
  • Our Commercial Services:

  • Emergency rekeying
  • Master key systems
  • Electronic access control
  • High-security lock installation
  • Safe services
  • Door hardware
  • Security consultations
  • After-hours emergency service
  • Protect Your Business Today

    Don't wait for a security incident to take action. Whether you're dealing with an employee departure right now or want to establish better security protocols, we can help.

    Call (410) 590-9844 for immediate commercial locksmith service.

    Available 24/7 because business security can't wait.

    ---

    Your business is your livelihood. Protect it with professional commercial security services from Maryland's trusted locksmith experts.

    Tags:commercial securitybusiness locksmithemployee terminationaccess controlcommercial locksmith Maryland

    Need Professional Locksmith Service?

    ASAP Mobile Locksmith MD provides 24/7 emergency locksmith services throughout Maryland.

    Call (410) 590-9844
    Same Day Service Available

    Need a Locksmith in Glen Burnie?

    Fast response, transparent pricing, and quality service.