- Has your computer network become a spaghetti junction of cables?
- Do you unplug cables hoping you have the right one?
- Would you know what to do if there were malicious programs running on one of your computers?
- If there was a fire or theft, how would you access your client data?
- If you got hit by a truck (let’s hope not), would your staff have the passwords they need to run the business?
If these are questions that have you concerned, we at Brash Media can assist.
Our Network Asset Audit can provide you with;
- Documentation on each device, including;
- General health status
- Capabilites
- Licenses
- Stored passwords
- Security recomendations (and solutions)
- Upgrade readiness
- Critical software and it’s support paths
- Labelling devices, components, and cables
- Network and Power maps
- Network termination
- Computer management policies and procedures on;
- Network breach management
- Data privacy protection
- Maintenance schedules
- EoL disposal
- Data back-up
- Disaster mitigation
One of the most arduous parts of ICT support for a technician is understanding the varying parts of a businesses network, how they fit together, and how to find support for those unique devices and software packages.
This documentation provides any competent ICT support tech with everything they need
