How to Run a Simple IT Audit

by | Managed Services

You can’t manage an IT system effectively if you don’t know what it comprises. It’s alarmingly easy to lose sight of what makes up your IT ecosystem. And the job isn’t made easier by developments like employees bringing their own devices to work.

1. Start with the hardware

Bring your own device policies have made it easier for IT to lose track of the hardware being used in the business. Less restrictive policies don’t just allow employees to bring in personal devices; they mean those with access to departmental budgets can amass all sorts of hardware without running the purchases through IT.

Your accounts department should be able to give you the official list of what hardware has been purchased. But other purchases might not have been given an “IT” code when run through accounts.

Now is a good time to survey department heads to see what’s actually in use. You’re likely in for some surprises. You’ll find some employees working on consumer devices they own and others working on consumer devices the company bought.

2. Good records make for good decisions

You can track the findings in a basic spreadsheet, but it’s better to use a dedicated desktop management app.

Knowing what’s actually happening will help you look into whether there are better ways to pay for what employees need.

3. Check those use-by dates

Keep an eye out for PCs, servers, printers, and other office hardware that’s close to end-of-life or end-of-lease. Work with your account department and suppliers to put together a plan for easing out the old to bring in the new.

4. Software audit

Find out what software is running on your machines—and which machines it’s running on.

Ask what budget was used to buy it. Again, this information will help you make better decisions in the future.

Remember, software can also have a use-by date if the vendor isn’t going to support it. And software as a service (SaaS) subscriptions do expire.

Those might not only be corporate subscriptions. Find out if employees are subscribing to their own cloud solutions. Even when those services are paid for on corporate credit cards, they can slip through accounting because they aren’t assigned to the right budget.

That problem is minor compared to those that can arise with employees downloading untested cloud software.

5. Security focus

Security software, like antivirus apps, virtual private network solutions, and encryption, needs special attention. You don’t want to find your license or subscription has lapsed when it’s key to your defenses.

6. Finish with a walk

Just by walking the floors, you’ll be amazed at what hardware and software use you spot that wasn’t picked up in any other process.

Find out how Pearl Solutions Group can perform a true IT assessment for your business, just fill out the form below and we’ll contact you.

How to Stop Data Theft

How to Stop Data Theft

Look around the office. Employees are the greatest risk when it comes to data theft because they are more likely to take or share sensitive company information when they leave their job. Often, they believe that they have a right because it's material they created....

read more
How Safe Are Your Mobile Workers?

How Safe Are Your Mobile Workers?

Previously, we shared the importance of having unique tools for a productive mobile employee as compared to the office employee. What is not unique is the company’s responsibility to provide a safe and comfortable work environment. Safety within the vehicle with...

read more
Finding Value in Microsoft 365

Finding Value in Microsoft 365

Microsoft’s Office Blogs expounds on the value that real business and their employees are seeing from making the transition to Microsoft 365. Customers are seeing the value of cloud computing in all its forms and Microsoft 365 can help to tie your organization...

read more

Schedule a FREE
Risk Assessment

Don’t wait for a disaster to be the reason why you need us. In one (free) conversation, we can uncover some essential ways to keep your business and your people up and running.

  • This field is for validation purposes and should be left unchanged.