Complete tasks to improve your security
Here are some examples of guidance we provide
Follow these steps to collect data on your critical hardware. Our Paid plan provides much more detail on what to collect.
Collect manufacturer, vendor, model, serial number for each item.
Collect data for computers, laptops, monitors, printers, and document scanners.
These include permanent licenses (older copies of Adobe software), rental products like anti-virus, drafting products like AutoCAD, engineering software like SolidWorks, architectural products like Enscape.
In our Paid plan, choosing and using a password manager are described in full detail.
We also provide procedures to protect your passwords in future.
A password app means you are developing good security habits.
The password app will help you use quality passwords, by creating them and saving them for you.
In our Paid plan, we describe a number of general topics on managing and arranging your network.
Here is one example topic.
We define risk as "unwanted outcomes" when considering future hazards.
In our Paid plan, we describe how to prepare for different types of disasters, and how to test your plans.
Here is one example topic.
In the case of a fire, you are likely to lose your equipment, your files, and, we hope, nothing else.
But you will likely lose access to the office, rooms or even building. If the building is damaged, fire marshalls will deny access because it is too risky to let people in.
You need a list of minimum information (accounts, passwords, services) and equipment (a laptop) to be able to provide notifications, announcements and resume operations.
This is the critical data you need to manage your equipment and software assets:
Click Here to Download your free asset spreadsheet Template.