How to Run a Simple IT Audit

by | Managed Services

You can’t manage an IT system effectively if you don’t know what it comprises. It’s alarmingly easy to lose sight of what makes up your IT ecosystem. And the job isn’t made easier by developments like employees bringing their own devices to work.

1. Start with the hardware

Bring your own device policies have made it easier for IT to lose track of the hardware being used in the business. Less restrictive policies don’t just allow employees to bring in personal devices; they mean those with access to departmental budgets can amass all sorts of hardware without running the purchases through IT.

Your accounts department should be able to give you the official list of what hardware has been purchased. But other purchases might not have been given an “IT” code when run through accounts.

Now is a good time to survey department heads to see what’s actually in use. You’re likely in for some surprises. You’ll find some employees working on consumer devices they own and others working on consumer devices the company bought.

2. Good records make for good decisions

You can track the findings in a basic spreadsheet, but it’s better to use a dedicated desktop management app.

Knowing what’s actually happening will help you look into whether there are better ways to pay for what employees need.

3. Check those use-by dates

Keep an eye out for PCs, servers, printers, and other office hardware that’s close to end-of-life or end-of-lease. Work with your account department and suppliers to put together a plan for easing out the old to bring in the new.

4. Software audit

Find out what software is running on your machines—and which machines it’s running on.

Ask what budget was used to buy it. Again, this information will help you make better decisions in the future.

Remember, software can also have a use-by date if the vendor isn’t going to support it. And software as a service (SaaS) subscriptions do expire.

Those might not only be corporate subscriptions. Find out if employees are subscribing to their own cloud solutions. Even when those services are paid for on corporate credit cards, they can slip through accounting because they aren’t assigned to the right budget.

That problem is minor compared to those that can arise with employees downloading untested cloud software.

5. Security focus

Security software, like antivirus apps, virtual private network solutions, and encryption, needs special attention. You don’t want to find your license or subscription has lapsed when it’s key to your defenses.

6. Finish with a walk

Just by walking the floors, you’ll be amazed at what hardware and software use you spot that wasn’t picked up in any other process.

Find out how Pearl Solutions Group can perform a true IT assessment for your business, just fill out the form below and we’ll contact you.

Protect Your Business During The Holidays

Protect Your Business During The Holidays

The holiday season is full of cheer—but for cybercriminals, it's also a time of opportunity. With businesses closing for extended periods and employees distracted by festivities, it's prime time for hackers to strike. Whether your company is shutting down for the...

read more
How to Qualify for Cyber Insurance

How to Qualify for Cyber Insurance

Cyber insurance is a safety net that can save you from financial ruin in the aftermath of a cyberattack. But here’s the catch: insurance providers aren’t handing out policies without expecting you to meet certain cybersecurity requirements first. Here are the main...

read more

Let's chat about how we can help.

Call us at 636.949.8850, grab a spot on our calendar, or fill out this form and we will reach out to you.

  • This field is for validation purposes and should be left unchanged.