Company Banner MS Trainer LogoMCP Logo
Home PageAudit ServicesSoftware ServicesSupport ServicesTrainingWeb Design

 

 

 

Identification
Diagnostic Check
Backup
Training Needs
Data Storage
Security

 

Audit Services

Audit services are designed to complete a full inventory of all computers and software currently in use at your location, and to determine if the hardware and software are compatible and working efficiently. We will identify the hardware and software configuration of each machine, carry out diagnostics to verify correct installation, check backup services if installed, perform a training needs analysis of each operator, analyse your use of user data storage, and check for correct virus protection.

Identification

Identification of computer systems purchased at different times and from different vendors is sometimes difficult.

We can prepare a summary of systems in your organisation, and their exact hardware configuration. This will assist in identifying those systems which need upgrading or replacing and serve to keep your inventory updated.

Identification of installed software will assist in verifying that you are legally in possession of valid licences for each installation and protect you from possible legal action.

Top of Page

Diagnostic Check

Such is the complexity of the modern Windows installation, that it easy, over a period of time, to corrupt the system with information downloaded from the Internet, or with programs incorrectly installed or removed.

A quick check of each machine can indicate whether further action is required, and the operator can be instructed in simple procedures to maintain the system in good order.

It is not unusual to find machine which are being replaced because the hard drives are full. Often this is simply caused by unwanted applications or temporary files.

Top of Page

Backup

It is said that there are only two real types of computer user! Those who backup their data regularly, and those who have never had a total hard disk crash or virus attack.

You only need to ask yourself the question; "what would be the effect if my computer was stolen today"? Think of business plans, important letters, accounts, tax records . . .

We can examine and suggest changes to your backup systems, or assist you to implement them if none exist!

Top of Page

Training Needs Analysis

Before investing time and effort in training, it is first vital to establish what tasks need to be done and what applications are available. An investigation into your procedures, work flow and operator skills is the only way to create a cost efficient plan for training. For each operator, we can establish: -

  • What are the tasks to be performed
  • What equipment is available to the operator
  • What software is being used
  • What skills does the operator need

A correct TNA should save a considerable amount of time and money, and result in much better work flow.

Top of Page

Data Storage

In conjunction with examining backup procedures, it is important to identify what data is being stored, and where. Generally there are two types of data: -

  • Company data, which is usually stored on a shared drive
  • Data which is personal to the operator or their application, which should be stored in a known location on their machine

A proper data storage regime will ease backup problems and increase security.

Top of Page

Security

Last, but not least is the frequently overlooked topic of security. There are two types of security breach: -

  • Theft of company or personal data from within the organisation, usually due to bad password procedures
  • External attacks on data by virus or hacking

Both types of attack can be largely eliminated with a proper application of passwords, anti-virus programs and firewalls. Evaluation of these procedures and proper operator training will greatly assist in keeping your information under your control.

Top of Page

 

Contact: - info@deepol Services
©Copyright Deepol Services - All Rights Reserved