What Types Of Things Should Be Documented?

One of the keys to being able to efficiently manage, support and use your IT systems is standardized documentation.

At White Mountain, we utilize a secure, state of the art database for documentation and client SOP’s (Standard Operating Procedures).  As we implement, manage and support your systems we are continuously referencing and updating the documentation that outlines what we did and how we did it.

The goal is to empower the support team to be as efficient as possible and to avoid depending on a single individual for critical information or knowledge.  Ensuring a high level of efficiency and responsiveness on our end, allows us to keep your costs down, and productivity up.  Having a professional Managed Service Provider supporting your business provides exponentially more value than a single employee or very small IT provider.

Here are a few of the things that should be included in your IT documentation:

  • Network diagram and floor-plan
  • ISP and circuit info
  • Inventory of all software and hardware
  • Complete documentation of servers
  • Security profile of data, share and user group access
  • Data backup requirements and system configuration
  • User census and profile
  • Firewall configuration and security profile
  • Remote access configuration
  • Third-party vendor information
  • and much, much more!

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Four Technologies You Can Use to Better Protect Your Data in Transit

Encryption Implementing strong encryption protocols works to secure data during transmission. From a technical point of view: SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols are commonly used to encrypt communication between a user's browser and a website. This added encryption ensures that any information exchanged is secure and cannot be easily intercepted by people looking to...

Cyberthreats Threaten Your Entire Business

How Cyberattacks Imperil Your Business Cyberattacks manifest differently from other threats and yield a diverse array of consequences. They often involve attempts to infiltrate an organization's technology infrastructure with the intent to steal data, extract monetary gain, or extort business proprietors. As a result, business owners and managers are confronted with a host of distressing scenario...

How to Prepare Your Business for Any Form of Disaster

Assessing Your Data Backup Needs To kickstart your disaster recovery strategy, it is crucial to assess your data backup needs. This involves identifying the types of data you possess, their importance to your operations, and the frequency at which they change. Conducting a thorough data audit will enable you to prioritize your backup efforts and allocate resources effectively. Implementing a Rob...

FTC Safeguards Gets a Crucial Update

What is the FTC Safeguards Rule? The FTC Safeguards Rule is a regulation that compels financial institutions under the FTC's jurisdiction to implement comprehensive measures to protect consumer data. The rule applies to a wide range of entities, including banks, mortgage lenders, credit unions, and other financial service providers. Its primary objective is to ensure that businesses establish and...