Skip to main content

5 Important IT checklists that no SMB should miss: Part-1

5 Important IT checklists that no SMB should miss: Part-1

IT checklists are a great way to analyze, understand and take the necessary steps to meet your IT requirements. In this blog, we discuss 2 of the 5 important IT checklists--Hardware/software and Cybersecurity.

When creating a checklist for hardware/software purchase, use, and installation, answer the following questions.

  1. How do you determine what hardware/software is needed?
  2. What about installation? Who will be doing it? Incorrect installation can end up resulting in loss of time and, in case of faulty hardware installation, it can also mess up the new hardware
  3. What is the process for the procurement of new hardware and software? Do you have regular vendors who you approach or do you start looking for a suitable one once the requirement arises
  4. Establish a policy for operating systems, because not all hardware/software is compatible with all OS.
  5. What about updates, security patches, and upgrades? Who will be responsible for them and how often?
  6. Who is responsible for software installation when there’s a new user requirement
Cybersecurity training can help reduce incidences of cybersecurity breach due to a lapse of judgment from your employees. Here’s what your cybersecurity checklist should cover- all security-related aspects of your IT. For example

  1. Create and implement a password policy that you want your staff to adhere to. Cover password hygiene, acceptable passwords, password sharing, reuse, password update rules, etc.,
  2. When someone quits your organization or no longer works in the profile that they were working in, how is the access issue addressed? Spell out the rules and regulations regarding the removal of a user from the network, changing passwords, limiting access, etc., Along the same lines, also cover new user initiation into the IT network.
  3. Include policies for data sharing--which data can be shared, where and by whom, who has access, the level of data access rights, etc.
  4. Spell out the plan of action to be taken in the event of a cybersecurity breach. Whom to contact, how to quarantine the affected systems, what steps are to be taken from the legal perspective (disclosure of the breach, data security violation penalties, and so on...) how to prevent such future events, etc.,
  5. Your cybersecurity checklist should not only cover the digital aspect of IT security, but also the physical aspect of it. Establish rules and regulations for physical access to data.
Interested in learning more? Watch out for our next blog that offers pointers on IT training, data backup and BYOD checklists.

Comments

Popular posts from this blog

Leave virus protection to your MSP Doctor

Leave virus protection to your MSP Doctor Cyberattacks on individuals and businesses for nasty purposes is nothing new. Stealing data, disrupting business, national activities, and just causing general mayhem has been going on for as long as there has been a digital world to attack. Ransomware, however, seems to stand out as a particularly unique and especially troublesome form of crime. For one thing, once an attack has happened, there is likely nothing to do to retrieve your data until you have given in to the demands of the criminals. As a small- to medium- sized business owner, you should never just rely on off-the shelf virus protection programs as the sole tool to protect your organization against cyber crime. In all cases you should rely on an IT professional to look at every aspect of your IT infrastructure to ensure that everything possible is being done to protect your data. Beyond that, ransomware attacks are a particularly troublesome form of crime that requires special...

Stars of the show: Cloud and VOIP

Stars of the show: Cloud and VOIP Despite annoying challenges presented by the abrupt shift to the WFH model thanks to the pandemic, there were some tech heroes that saved the day. These two made WFH possible. The cloud The cloud is that platform whereby you outsource your data storage as well as many of your applications. With the cloud, your data and software applications are no longer physically located in a specific geographic location. Therefore, access is no longer tethered to a user's physical location. The cloud was the biggest game changer during the pandemic because it allowed businesses to get anytime, anywhere access to their data as well as critical applications. It wouldn’t be wrong to say that if it weren’t for the cloud, a lot of businesses wouldn’t have been able to survive the pandemic at all. VoIP Along with the cloud, VOIP proved to be one of the most critical elements when it came to business continuity during this pandemic. It revolutionized business commu...

Two reasons to pay attention to software

Two reasons to pay attention to software Software matters. What your employees use can impact your firm and your customers. Pay attention. Make rules. New software applications In the pre-pandemic phase, even when companies had staff working from home they were fewer in number and a lot of them even came into the office a couple of times a week to ‘just catch up’ on work and with colleagues. So, no one really had paid any attention to collaborative software programs because engagement levels were pretty high with just a handful of staff working remotely and connecting on the phone or in-person anyway. It was only after the pandemic forced organizations in their entirety began to operate –from CEO to intern–that businesses recognized the need for collaborative software programs such as Microsoft Teams, Zoom Meetings, Google Meet, etc. Similarly, from the productivity tracking perspective, software programs such as TimeDoctor, Roadmap, Tick, Timely, etc., became popular. The challenges...