Your Current IT Support Has Tool Much Control If You Can’t Answer “Yes” To The Following 5 Questions
You need to be able to trust in your IT service provider. After all, they have access to all of your company’s IT infrastructure and data. But what if you were no longer satisfied with their services or they were to go out of business? Could you be sure that you could easily get the information you need so not to jeopardize your computer network and ultimately your business? Ask yourself the following 6 questions:
- Do you know all administrative passwords? Every PC, laptop, server and connected device on your network has (or should have) a password. If your current IT provider is the only one who knows what they are then you may not be able view, change, or update the system settings. You should also know the passwords to your company’s database and accounting packages so you can have control over your network and its access.
- Do you know where your backup files are stored and how to access them if needed? If you are like most business owners, you’re too busy dealing with other business issues to think about system backups and probably leave those tasks to your IT support provider. If your database gets fried and your tech is nowhere to be found, you might be in a lot of trouble.
- Do you have all the product keys and installation media to your software? Product keys are long, alphanumeric codes, usually printed on the back of the software’s packing material or sent via email, that are required to install or re-install software. Always make sure you have these stored in a secure location. Without them, you may need to repurchase the software if you cannot prove you originally owned it.
- Do you know what routine maintenance tasks have be done to your network? I know that the idea of learning about and keeping track of all the servers, workstations, and peripherals on your network can be overwhelming, but it can be crucial to your networks stability. If your IT expert leaves without providing you with this information, you may need to pay a new professional to audit and take this work over.
- Do you know how to protect your network from an security breach if your computer expert leaves? What happens if you part ways with your IT expert and he or she still has access to your company’s network? Do you know all the ways into your network? As soon as possible, access to your system has to be disabled, including remote access to your network.
If you answered “No” to any of these questions, you should be concerned. Any ethical IT provider who is secure enough with the quality of their services should welcome the opportunity to provide you with the answers. We document every aspect of our clients networks and provide them access to this information. Information to support a network should be used to benefit the IT infrastructure and NOT used to hold a client hostage.