What Types Of Things Should Be Documented?

One of the keys to being able to efficiently manage, support and use your IT systems is standardized documentation.

At White Mountain, we utilize a secure, state of the art database for documentation and client SOP’s (Standard Operating Procedures).  As we implement, manage and support your systems we are continuously referencing and updating the documentation that outlines what we did and how we did it.

The goal is to empower the support team to be as efficient as possible and to avoid depending on a single individual for critical information or knowledge.  Ensuring a high level of efficiency and responsiveness on our end, allows us to keep your costs down, and productivity up.  Having a professional Managed Service Provider supporting your business provides exponentially more value than a single employee or very small IT provider.

Here are a few of the things that should be included in your IT documentation:

  • Network diagram and floor-plan
  • ISP and circuit info
  • Inventory of all software and hardware
  • Complete documentation of servers
  • Security profile of data, share and user group access
  • Data backup requirements and system configuration
  • User census and profile
  • Firewall configuration and security profile
  • Remote access configuration
  • Third-party vendor information
  • and much, much more!

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Ransomware is One Problem that Leads to Many More

The Simple Fact is that Ransomware Hurts in Many Ways Let?s walk through what a modern ransomware attack might look like, acknowledging all the ways that the affected business would suffer as a result of the infection. A ransomware attack begins with an attacker reaching out and communicating with an intended victim as part of a phishing attack to gain access to said victim?s device or networ...

Is Your Organization Prepared to Invest What is Needed into Cybersecurity?

Safeguarding your business' infrastructure from various threats is a well-known imperative. In discussions about network security, the term "endpoint" frequently arises. Exploring the significance of securing all endpoints is the focus of today's article. Commencing with an elucidation of what constitutes an endpoint, we define it as "any device connected to a network capable of serving as a po...

How to Transition to or Establish a New Office Location

It’s always exciting when you can expand your business’ influence with a new location, but this excitement brings with it all kinds of complications. There’s always something, whether it’s the technology for the new location or the logistics surrounding the opening. Let’s look at how you can make sure that technology is not the thing that holds your business back from opening a new location. All ...

Insurance Companies Are Asking My Business About Its Cybersecurity. What’s the Deal?

You might have noticed that business insurance companies are starting to show an interest in how you are protecting your technology and data. If your org has been in touch with your insurance provider regarding modifying or renewing your business insurance, you were likely handed a lengthy questionnaire about your cybersecurity. Let’s take a look together to help you make informed decisions on how...