Managed IT Services & Cyber Security Assessment for SMBs

A checklist for evaluating your IT management & data security

When you’re running a small to medium sized business (SMB), you wear many hats. Between serving existing customers, closing new business, and working toward established business goals, things like IT management and data security may not be getting the attention they need. You may be trying to handle IT functions in house, using an outside consultant, or contracting with multiple vendors to get the job done. No matter which approach you take, it’s never been more important to ensure your business is prepared and protected.

Don’t wait until a security breach or system outage disrupts your business to make IT management and data security top priorities.

How it Works

  1. Gather the Information: The amount and the quality of information will determine the level of understanding when it comes to IT decision making. At the very least, use this checklist to assess the current state of your IT operations and identify where critical gaps may be costing you money, hampering your productivity, or putting your business at risk.
  2. Gather stakeholders: At the decision-making stage, it’s important to not only consult the IT subject experts but also involve the business owners and employees who will be directly affected by your decision.
  3. Brainstorm: Through the use of tools such as the decision-making matrix, your team can go over all risks and opportunities involved in your IT environment.
  4. Analysis: Analyze all information you’ve so far gathered to make an informed decision.
  5. Decision making: Work towards developing an action plan that will improve the IT environment.

Strategy and Planning


  • Do you currently have an IT strategy?
  • Do you have a Managed Service Provider (MSP) or vendor who can guide you in developing a comprehensive and forward-looking IT strategy?
  • Do you or your vendors hold frequent IT strategy meetings to get ahead of potential issues?
  • Do you or your vendors discuss the latest technologies that could improve your business and lower cost?
  • Does your business have a WISP (Written Information Security Plan)?

Overall IT Operations and Management


  • Do you manage your own IT?
  • Does one vendor manage all your IT needs (application/data hosting, onsite device management, user support, cybersecurity, etc.)?
  • Do you use multiple vendors to manage your IT operations (application/data hosting, onsite device management, user support, cybersecurity, etc.)?
  • Has your business considered consolidating IT to lower cost and improve productivity?
  • Would it be beneficial to have one bill and one support team for all your IT and cybersecurity needs including application hosting, local device management, Microsoft 365, user onboarding, help desk support, email security, MFA, MDR, antivirus/anti-malware, and more?

Onsite Device Management and User Support


  • Are your local devices, such as servers, PCs, and laptops, up to date with the latest patches and monitoring software to ensure peak performance and avoid downtime?
  • Do you have a streamlined automated onboarding process when adding new users/employees?
  • Do you perform monthly health checks of your IT environment to identify potential issues, vulnerabilities, and opportunities for optimization?
  • Does your IT vendor offer 24/7 remote IT support to ensure your end-users stay productive and engaged?
  • Does your IT vendor include unlimited support in its monthly fee, or does the vendor charge by support call or incident?

Cybersecurity


  • Do you currently have enhanced email security to protect against phishing threats?
  • Do you provide security awareness training to your employees?
  • Do you currently use MFA (Multi-Factor Authentication) to enhance security?
  • Are your servers and workstations up to date with the latest MDR (Managed Detection and Response) solutions to detect and eliminate threats in real time?
  • Are your antivirus and anti-malware solutions administered on all devices and updated regularly?



share checklist:

If this exercise revealed gaps in your IT management and data security, or if you’re simply dissatisfied with your current IT approach, contact Infinitely Virtual or call 866-257-8455. Let’s discuss how IV can help optimize your IT operations for higher productivity, reduced costs, and lower business risk.