Initial Setup
Make an office floor planInclude locations of server room, conference room, printer, etc.
Select ISP(Internet Service Provider)Get a secondary ISP as failover
Check the Wiring and Power Sockets
CablesRecommended cables are used and run to required locations
PortsSufficient number of Ports are available at all locations
Router locationsElectrical outlets and ports are available
AP locationsElectrical outlets and ports are available
WorkstationsElectrical outlets and ports are available
Printers & ScannersElectrical outlets and ports are available
UPSElectrical outlets are available
Set up IT first
Server room
Network Infrastructure
Work stations
Printets & ScannersLower priority
Conference RoomLower priority
IT Infrastructure
New equipment is compatible with other devices you use
New equipment is suitable for business network environmentAvoid consumer grade equipment, especially for Network and WiFi
New equipment has appropriate warranty
Operating system is as standardized by IT
Purchase of Servers, Network Attached Storage Devices, and Network &WiFi equipment has been done considering future growth
Installed by in-house expert
Installed by outsourced IT expert
Installed by vendorNote contact information for service calls
Latest drivers are installed
Equipment is added to the IT inventory management system
Basic troubleshooting and maintenance guides are readily available
On new computers and mobile devices, anti-virus and malware protection is installed
You regularly review your IT infrastructure for equipment with lapsed warranty. Either renew the warranty or purchase new equipment.
You review your IT needs at frequent intervals. Are you using the best available solutions?
You research the market for new technology at least once every three years.
You maintain a list of all service contracts and vendor contact information
You monitor your Routers, Switches, and Access Points and upgrade them before you experience connectivity issues.
You monitor your Servers and NAS devices for capacity and performance.
You maintain a whitelist of applications that are allowed to be installed on computers and mobile devices
You use an MDM for assessing and deploying security patches to ensure secure mobile devices, operating systems, and applications
You keep auto-update on for your OS, applications, and anti-virus
Administrative privileges are restricted to your IT team
You have made two factor authentication mandatory
Customising options are limited to power users.
Software is only installed from a trusted source
You have an in-house IT expert who manages the deployment and set up of software.
If you dont have an in-house expert, outsource software deployment to a trusted Managed IT Services company
You maintain a list of software installed and corresponding licence
You maintain a list of accounts (usernames and passwords) that use online services
You have someone responsible for monitoring and renewing domain names and web hosting services
You have scheduled virus scans for all users and systems.
You have spam filters in place for all users
The Cloud
You know your business' privacy obligations and review it regularly
You have policies in place to ensure that your privacy obligations are met
You know and regularly review your data storage obligations
The cloud services you use meets your data storage and privacy compliance requirements
Your cloud service provider offers SLAs that are consistent with your business requirements
Your SLAs have clauses on response times, business continuity, and disaster recovery
You have someone responsible for software upgrades
Access to user data is restricted to required users
You have a plan in place for loss of access to cloud services
You have a plan in place in case of data breach
Ensure passwords are strong and secure. Use a password manager.
Limit system access based on role and needs
You use only legitimate software, applications, and browser extensions from trusted sources
Avoid using public wireless netowrks. Use VPN if you have to use public WiFi
Use physical locks on your laptops when working in public
Always lock the device when leaving it unattended
Do not use USBs or external hard drives from unfamiliar sources. Always scan external storage device before use
Schedule daily backups for all critical files and data
You have a disaster recovery and business continuity plan in place
You have trained the relevant employees in the disaster recovery process
You have an acceptable use policy covering use of computers, mobile devices, and other IT resources as well as Social Media tools
You review permissions to access shared folders, systems, and applications regularly and remove people who no longer need the access
You have set up disk quotas to limit employee use of servers and cloud services.
You provide requisite information and training to employees on the software and hardware they will use
You have a plan in place for how you isolate infected machines and clean them
You regularly hold trainings for employees on cyber-threats
You regularly conduct phishing audits and penetration tests
You maintain an FAQ on company IT and Security policies
You do not store critical business data on external drives or USBs
You are able to remotely wipe mobile devices if lost or stolen