Audit services are designed to complete a full inventory of all computers and software currently in use at your location, and to determine if the hardware and software are compatible and working efficiently. We will identify the hardware and software configuration of each machine, carry out diagnostics to verify correct installation, check backup services if installed, perform a training needs analysis of each operator, analyse your use of user data storage, and check for correct virus protection.
Identification of computer systems purchased at different times and from different vendors is sometimes difficult.
We can prepare a summary of systems in your organisation, and their exact hardware configuration. This will assist in identifying those systems which need upgrading or replacing and serve to keep your inventory updated.
Identification of installed software will assist in verifying that you are legally in possession of valid licences for each installation and protect you from possible legal action.
Such is the complexity of the modern Windows installation, that it easy, over a period of time, to corrupt the system with information downloaded from the Internet, or with programs incorrectly installed or removed.
A quick check of each machine can indicate whether further action is required, and the operator can be instructed in simple procedures to maintain the system in good order.
It is not unusual to find machine which are being replaced because the hard drives are full. Often this is simply caused by unwanted applications or temporary files.
It is said that there are only two real types of computer user! Those who backup their data regularly, and those who have never had a total hard disk crash or virus attack.
You only need to ask yourself the question; "what would be the effect if my computer was stolen today"? Think of business plans, important letters, accounts, tax records . . .
We can examine and suggest changes to your backup systems, or assist you to implement them if none exist!
Before investing time and effort in training, it is first vital to establish what tasks need to be done and what applications are available. An investigation into your procedures, work flow and operator skills is the only way to create a cost efficient plan for training. For each operator, we can establish: -
A correct TNA should save a considerable amount of time and money, and result in much better work flow.
In conjunction with examining backup procedures, it is important to identify what data is being stored, and where. Generally there are two types of data: -
A proper data storage regime will ease backup problems and increase security.
Last, but not least is the frequently overlooked topic of security. There are two types of security breach: -
Both types of attack can be largely eliminated with a proper application of passwords, anti-virus programs and firewalls. Evaluation of these procedures and proper operator training will greatly assist in keeping your information under your control.
Contact: - info@deepol