1 Step - Documentation -
- Review and document everything before jumping into making changes.
- Make a list of all computer equipment phone systems and peripherals of
the company.
- Find and familiarize yourself with any existing documentation left by your
predecessor and verify that this documentation is still accurate and
up-to-date.
- Check all recorded usernames, passwords and update as appropriate.
- Inventory your hardware, from server rooms to client terminals.
- Check how old is your equipment and how is it running.
- Finally, don’t forget about things such as maintenance contracts and
software licenses.
2 Step - Assess and Verify Network Security-
- Make sure the company has installed a good spam, anti-virus and firewall
software.
Check that your spam and anti-virus definitions are up-to-date.
- Review who has network access and at what levels.
- Manage user accounts with strong individual passwords.
- As a precaution force a change to all passwords, but certainly to
administrator passwords to
ensure no previous users have unauthorized access.
- Learn what each user of the company is accessing and why.
Create software policies for each user.
- Run network monitoring tools to inspect network communications.
3 Step -Review or Establish Disaster Recovery and Backup-
- Check for existing backups and disaster recovery plans.
If no backups and disaster recovery plans exist make it a priority. Ensure
no data will be lost.
If they are in place, you’ll still want to verify that they’re up-to-date
and functional.
- Communicate with management and other company members to ensure you’re
backing up the right data and important
system information and that you can restore that data.
-Test existing Backups.
4. Step -Communication-
-Talk and listen with all members of the company, helps with understanding
the needs and requirements of the network.
No comments:
Post a Comment