5 Topics Every Business Owner Should Bring Up with Their IT Support

Sep 21, 2023

Documentation
IT Support team

If you’re running a small or medium-sized business in Auckland, these are the critical conversations you should be having with your IT support provider. Ignoring these could mean the difference between a secure, efficient operation and a costly setback.

1. The Non-Negotiable: Multi-Factor Authentication

Secure passwords alone aren’t enough anymore. Multi-Factor Authentication (MFA) adds an extra layer of protection and is a free feature already included in Microsoft 365 and G Suite. Discuss enabling this with your IT support ASAP.

2. The Lifesaver: Backup Testing

You may have regular backups, but have you ensured they’re reliable? Backups should be tested at least every month to confirm they’ll work when you most need them. Consult your IT partner to make this a recurring task.

3. The Gatekeeper: Auditing Remote Access and Network Security

With remote work becoming increasingly common, auditing your network’s remote access points is critical. Whether it’s RDP, VPNs, or firewalls, ensure you discuss the current setup and potential vulnerabilities with your IT support. Regularly review who has access and whether your security protocols are up to date.

4. The Watchtower: Software Updates

Neglecting software updates will open the door to cyber threatsโ€”it’s not a matter of if, but when. Collaborate with your IT provider to maintain a regular update schedule, so you can focus on running your business without cyber concerns.

5. The Safety Net: Disaster Recovery Plan

Every business needs a comprehensive Disaster Recovery Plan (DRP). Discuss the specifics with your IT support, from data recovery steps to team roles and communication strategies for handling significant IT incidents.

Ready for peace of mind? If you’re looking for a local, personable, and experienced IT partner in Auckland to help you manage these essential points and more, reach out for a free consultation. Make your business as resilient and ambitious as you are.

Want Great IT Support?

Want to know how you can get efficient, reliable IT support that works with your business the way you want it?

You may also like…

Check your Microsoft Sign-In Logs!

Check your Microsoft Sign-In Logs!

Have you checked your Microsoft sign-in logs lately?If not, you should...https://mysignins.microsoft.com/๐—ช๐—ต๐—ฎ๐˜ ๐˜๐—ผ ๐—น๐—ผ๐—ผ๐—ธ ๐—ณ๐—ผ๐—ฟ:โ€ข Logins from unusual locationsโ€ข Apps youโ€™ve never usedโ€ข Failed sign-in attemptsIf anything looks suspicious, contact your IT admin straight away....

The most common phishing attack of 2025

The most common phishing attack of 2025

Weโ€™re seeing this attack everywhere in the wild right now. A real contact of yours emails you a file to review. You click. A Microsoft sign in appears. You log in. The file never opens. ๐–๐ก๐š๐ญ ๐ข๐ฌ ๐š๐œ๐ญ๐ฎ๐š๐ฅ๐ฅ๐ฒ ๐ก๐š๐ฉ๐ฉ๐ž๐ง๐ข๐ง๐ : Attackers hijack a mailbox, then send an email to...

Monitor Your Microsoft Sign-In Logs!

Monitor Your Microsoft Sign-In Logs!

Ever wondered how you'd know if someone has breached your Office365 account? Think about the implications: They could email your clients or staff, compromise sensitive information, or even hold your files for ransom. As a business owner, you're usually the juiciest...