Documenting Your Network – Part 3 of 5

Jan 27, 2012 | Networks

Moving right along… some of the other critical documents you should have and keep up to date for your network:

PC Setup Guide:

The PC Setup Guide is used to ensure a consistent setup and configuration of end user machines. This document allows for consistency within your infrastructure.  In other words, it helps you avoid the hodgepodge network scenario making it easier to support.

Administrator Password Change Guide:

The Administrative Password Change Procedure is a checklist and guide that ensures that all critical administrative and service accounts are identified, maintained, and updated during any system changes (personnel, threat defense, or maintenance) that would expose the system or its data to potential risk. All accounts that have elevated rights or access should be reviewed, documented, and changed if necessary.  This is most commonly used when an employee quits, or is terminated, so that the proper measures are taken to avoid a potential future security breach.

Security Review:

The Security Review is used as a guideline for hardening the IT network by asking questions about key security components such as business policies, systems management, and best practices for basic security components.

Recent Posts

So, What’s the Big Deal About Ransomware?

So, What’s the Big Deal About Ransomware?

Thanks to the recent Colonial Pipeline and JBS cyberattacks (and their subsequent impacts), you’re probably encountering the term ransomware more than you used to and it’s not hard to see why – the number of successful ransomware attacks is rising dramatically. The...

A New Era in Cybersecurity – Assume Breach Mentality

A New Era in Cybersecurity – Assume Breach Mentality

As we kickoff a new year of 2021 and begin marching towards this year’s goals and objectives for success, I wanted to share thoughts and feedback around the ever-growing elephant in the room called cybersecurity. It has been a challenge for small businesses for many...