Call (716) 373-4467

Here’s an important
question most businesses don’t think about: what would happen if your in-house
IT guru suddenly quit? Most business owners think it would only be a temporary inconvenience
when, in fact, the opposite is usually true. Want to know how much you are at
risk? Ask yourself the following 6 questions:

1.  Do
you have written network documentation about your computer network?
software licenses do you own? What are the critical administrator passwords to
your systems and devices? How is your computer network structured? What
hardware do you own and when do your equipment warranties expire? Are there
cloud vendors for email, online storage, etc. that you don’t currently have?
You should NEVER allow a single IT person to keep this information under their
full control over your network and company. If they suddenly left for any
reason, this could lead to huge consequences for your company.

2.    Do
you know where your backup files are stored and if they are being stored
If you are like most business owners,
you’re too busy dealing with the “crisis of the day” to think about system
backups and probably leave tasks to your internal expert. If your database gets
fried and your tech is nowhere to be found, you might be in a lot of trouble.

3.   Do
you have a written plan for restoring your network fast in the case of a
If you don’t have a fully tested
disaster recovery plan for your office, you could be at serious risk without
ever knowing it until something happens.

4.   Do
you know where all of your software is stored?

Bad things can happen to computers and servers, and the situation can be made
worse if you are not prepared. Taking a minute to organize and store your
software in a secure place can save you a considerable chunk of money in the
event that you need to restore a program on your systems. If you don’t have
access to the software or don’t know where it is located, you might be forced
to buy the software again.

5.   Do
you know what routine maintenance must be done to your network?

I know that the very idea of learning about and keeping track of all the
servers, workstations, and peripherals on your network probably gives you a
major headache, but it is important information to maintain. If your in-house
expert leaves, who will take over?

6.   Do
you know how to protect yourself from an ugly security breach if your in-house
computer expert leaves?
What happens if your
in-house expert splits with no warning AND has access to your company’s
network? As soon as humanly possible, you should disable his or her access,
including remote access to y our network and all cloud based applications.

So how did you
do? If you answered “no” to even one of these questions, you need to get the
answers now before it’s too late. Click here to get started or call
716-373-4467 x 15 to speak with a Databranch Computer Expert!

2FA AI APC backup Breaches business continuity Business Email Compromise BYOD client of the month cloud computing computer services computer support computer upgrade Computer Upgrades Control Chief covid-19 CryptoLocker CryptoWall Cyber Attacks cyber criminal cyberattack cybercrime cybersecurity Cybersecurity Training Dark Web Monitoring Dark web scan Data Breach Data Breaches data protection Data-Loss Prevention Databranch Databranch Comprehensive Care databranch cto databranch employees Device Security Discounts DNS Filtering doug wilson dura-bilt email migration email security End of Support Exchange Online Facebook field technician Hackers Hardware Refresh heat-induced server crash holiday computer tips holiday internet tips How Long Do I have to Upgrade my Windows 7 Computers? i.t. service provider ID Agent Information Technology Internet Security IT Compliance IT Outsourcing IT Security IT Services J.P. Morgan Juice Jacking local admin privileges malware managed service managed service provider managed services MFA Microsoft Microsoft End of Support Microsoft Office Microsoft Patching Microsoft Support Microsoft Telephone Scam mike wilson mobile device security Mobile Devices Multi-Factor Authentication Network Infrastructure Office 2013 Office 365 old UPS password management Password Manager Password Protection password security Passwords PC Performance Penn-Troy Manufacturing Personal Data phishing Phishing Attacks Power Failure productivity Professional Tune-Up proper server environment Ransomware remote access repeatbusinesssystems SBS2011 Scammers Scams security Security Key security vulnerabilty Server 2008 Server 2008R2 Server Upgrade server virtualization Small Business Small Business Server 2011 smb Smishing SMS SMS intercept Social Media Social Media Security Solid-State Drive stolen credentials Symantec Symantec Backup Exec technology best practices temperature Tips Two-Factor Authentication Upgrading to Windows 10 UPS virus VPN Vulnerabilities Vulnerability Assessment Warning Signs Western New York Windows 10 Windows 7 Windows Server 2003 Windows Server 2012 winrar Work Computers