IT audit
and consulting
and security
A team you can trust.
Proactive approach – we act before problems arise.
Experienced auditors and consultants – practitioners, not theorists.
Partnerships with IT vendors – better pricing and shorter lead times.
In-house purchasing and service department – fast order and repair fulfillment.
Dedicated technical and sales support.
Regular training and team updates. Transparency and progress reporting.
our
support.
Every IT audit procedure includes several key elements that are crucial from the perspective of the company owner or management. It's worth using the list below when searching for a potential IT audit provider and verifying that each issue will be discussed in depth.
1. IT Audit: Verifying Backup Performance. We begin by verifying whether backups are being performed at all and whether it is possible to restore the company's key IT systems within a specified timeframe based on the existing backup.
2. IT Audit: Developing a Backup Policy. Over 70% of clients for whom we have performed an IT audit either did not have any backups or their condition was beyond recovery. Therefore, we create a new backup policy. This document must include the following information:
- what resources (i.e., physical servers, virtual servers) are covered by the backup procedure;
- how the backup is performed – here, we always recommend a comprehensive approach, i.e., backing up entire servers;
- in what locations and on what devices are backups stored?
- what is the backup schedule?
- how often should test data recovery be performed?
3. IT Audit: Determining the company's recovery time in the event of a critical failure? This is crucial information for every company owner or management. Unfortunately, in many cases, attention to this topic only arises during an IT disaster, when the entire organization simply ceases to function. The company's recovery time in the event of a critical failure can be determined based on the implemented backup policy. While this will be an estimate, it provides a tangible indication of the IT department's capabilities.
An information security audit is a process that involves assessing how an organization's data and information are protected. The goal is to identify potential security gaps and risks associated with data loss or breach. The audit may include reviewing access management, network security, physical security, risk management practices, and security policies and procedures. At Support Online, we offer a range of services related to information security audits, including:
- Security Policy and Procedure Assessment: We verify that current policies and procedures are effective and compliant with industry best practices.
- Penetration Testing: We conduct tests that simulate attacks on IT systems to identify vulnerabilities.
- Risk Assessment: We analyze potential information security threats and assess their likelihood and potential impact.
- Consulting: Based on the audit results, we provide recommendations for improving the organization's information security.
An IT audit is a detailed analysis of an organization's IT systems to assess their operation, security, and effectiveness. This process involves examining various aspects of the IT infrastructure, including hardware, software, networks, operational procedures, data resources, and security features.
An IT audit can help identify potential issues or vulnerabilities that may impact an organization's operations, as well as ensure compliance with regulations and industry standards.
At Support Online, we have experienced IT specialists who specialize in conducting IT audits. Our team has extensive experience and technical expertise to effectively assess and optimize our clients' IT systems. Our approach to IT audits allows us to provide our clients with valuable feedback that will help them improve the efficiency and security of their IT infrastructure.
In our approach to IT project implementation at Support Online, we focus on the following key stages:
- Identification and inventory of current IT systems: We understand the client's infrastructure to better understand its operation and needs.
- Defining client requirements from a technical and economic perspective: We understand the client's needs and tailor our services to those requirements.
- Developing project briefs: We prepare a strategy to achieve project goals.
- Planning and implementing data center migration: We migrate client resources to a secure and reliable data center infrastructure.
- Implementing new resources in the data center: We strengthen the client's IT infrastructure by adding new resources as needed.
- Preparing a technical proposal for specific solutions: We propose the most appropriate solutions that best fit the client's needs.
- Implementing the selected technical concept, including domain hosting, applications, racks, virtual and physical servers.
- Virtualizing existing and new environments using VMWare and Hyper-V technologies.
- Developing post-project documentation, including policies, procedures, and instructions.
- Performing technical work, including configuration.
- Planning administrative activities to reduce the workload of local IT teams.
- Advanced systems management, with the goal of outsourcing all administrative tasks.
- Planning backups to ensure data security.
- Planning monitoring systems to ensure continuous control over systems.
- Planning the maintenance of the entire solution, ensuring the reliability and efficiency of the IT infrastructure.
Support Online conducts IT audits most often in two situations. The first, and most common, situation is the establishment of a partnership as part of a comprehensive IT service. In this case, the IT audit serves as an opening balance and simultaneously determines the direction of changes in the client's IT infrastructure for the next 3-5 years.
For Support Online, where IT outsourcing is the foundation of the business, this is a critical moment. Even a small error in diagnosing the client's needs and/or selecting IT solutions can spell failure in further cooperation. Every company where IT services are a key source of revenue must prioritize long-term relationships, as only these guarantee further business growth.
The second scenario involves clients verifying the performance of their internal IT department. This involves verifying operational tasks and long-term concepts for the company's IT development, which should originate from the IT department. We often discuss and propose ideas such as:
- company digitalization, i.e., implementing solutions enabling the transition to remote work, such as terminal services;
- IT system consolidation within a single ecosystem, e.g., Office 365 (Microsoft 365);
- implementation of tools from the "cloud solutions for businesses" catalog: private cloud, cloud replication, or cloud backup;
- preparation and implementation of a disaster recovery plan (DRC): an IT business continuity plan;
- increasing the organization's resilience to cybercriminal attacks through, among other things, anti-phishing training;
IT audit is a broad concept, and as of yet, consistent standards for the service itself have not been developed. This is clearly evident in the example of requests for quotes submitted to Support Online. On the one hand, we have a rather large (and at the same time interesting) range of terms used by clients:
- IT systems audit;
- IT infrastructure audit;
- IT communications audit;
- IT environment audit;
- IT security audit, including information security;
- IT security audit;
- including: audits of computer hardware, LAN networks, license compliance, computer networks, etc.
On the other hand, clients have a very wide range of requirements, which are difficult to describe here. Perhaps someday in the future, IT audits will be precisely categorized, as is the case with audits of, for example, financial statements. A positive aspect is that most IT companies have developed their own very precise definition of IT audits, based on their experience. For customers, this means carefully reviewing the service's specifications at an early stage of selecting a contractor. So let's see what Online Support has to offer in this regard.
Twenty years of experience in providing IT services and completing hundreds of audits have allowed us to develop an effective collaboration model. Our IT audit offerings include IT infrastructure analysis, security assessments, a review of IT processes and procedures, and recommendations for improvement. The audit can cover all or part of your company's IT areas.
An IT audit helps identify and fix weaknesses in IT systems, improve data security, increase operational efficiency, and ensure compliance with regulations and industry standards.
Our IT auditors have many years of experience, relevant industry certifications, and specialized knowledge of the latest technologies and security standards.
The IT audit process includes an analysis of IT systems, a documentation review, employee interviews, and system testing. The duration of the audit depends on the scope and complexity of the company's IT infrastructure, typically lasting from several days to several weeks.
Before starting the audit, we will need detailed information about your company's IT systems, IT infrastructure, security policies, and license management.
IT audit costs depend on the scope and detail of the audit. We prepare individual quotes based on the client's specific needs and requirements.
Ideally, once a year or after major changes to the IT infrastructure or IT department
No. We complete most activities without disrupting users.
Yes. We always determine the scope individually.
Yes. We advise and assist in implementing audit recommendations.
We offer audits of IT systems, IT infrastructure, ICT, IT environment, IT security (including information security), IT security, computer hardware, LAN, license compliance, and computer network.
The result of an IT audit is a detailed report on the work performed, along with a risk assessment and our recommendations for corrective or optimization actions.
IT Audit Scope in Online Support
1. Audit Scope from a Functional Perspective:
- Creating Data Backups
- Company IT Security
- Physical Security of Network Devices, Servers, and Cloud Computing
- Workstation Security and Operation
- Developing a Company IT Development Strategy
2. Audit Scope from an Audited Area (Auditor):
2.1 WAN Audit
- Verification of Contracts with the Internet Service Provider
- Verification of WAN Connection Speed and Quality
- Verification of Router and Firewall Configuration
2.2 LAN Audit
- Verification of Structured Cabling Condition
- Verification of Switch Configuration
- Verification of Access Point and Wi-Fi Network Configuration
- Verification of Virtual Network/VLAN Configuration
2.3 Inspection of Server Rooms and Intermediate Distribution Points
- Verification of Server Room Access Procedures
- Verification of Cooling and Firefighting Equipment in Rooms
2.4 Audit Windows Servers
- Security Configuration Check – Best Practices
- Verification of Warranty Services
- Log Check
- Checking Services and Processes Running on Servers
- Checking Applications Installed on Servers
- Checking Updates Installed on Servers
- Checking Backup Configuration for Servers
2.5 Linux/Unix Server Audit
- Security Hardware Configuration Check
- Verification of Warranty Services
- Checking Server Logs
- Checking Services Running on Servers
- Checking Updates Installed on Servers
- Checking Backup Configuration for Servers
2.6 NAS/SAN Storage Audit
- Security Hardware Configuration Check
- Verification of Warranty Services
- Log Check
- Firmware Update Check
- Checking Backup Configuration
2.7 Active Directory Audit
- Checking Active Directory Forest and Domain Versions
- Domains and Trusts – number and direction
- Domain check – dcdiag
- Replication verification
- Site and subnet check without assignment
- Password policy
- GPO policy configuration check
2.8 Auditing cloud identity services: EntraID, Google, AWS, OKTA, and others
- Verifying account and group creation
- Multi-factor authentication (MFA)
- Trust relationships
- Dynamic groups
- Additional attributes
2.9 Auditing cloud computing services (Iaas/Paas/Saas)
- Types of cloud services used by the company
- Method of accessing cloud services and collaborating with the on-premises environment (hybrid)
- Cloud resource audit
- Cloud environment security settings
2.10 Cryptography audit
- Disk encryption for physical and virtual servers
- Encryption of user computers and mobile devices
- Backup encryption Security
- Use of certificates in web and network services
- Use of cryptographic cards/hardware keys
- PKI architecture
- Key management audit
2.11 PC and laptop audit
- Checking the security configuration of the computer;
- Checking and verifying the licenses of applications installed on the computer;
2.12 Checking IT procedures and documentation
- Verifying backup procedures
- Verifying disaster recovery procedures
- Verifying business continuity procedures
- Verifying security policy
- Verifying employee hiring/termination procedures
- Verifying computer network diagram documentation
- Verifying key application documentation
IT audit report, post-audit recommendations, and implementation
The result of the IT audit is a detailed report on the work performed, along with a risk assessment and our recommendations for corrective or optimization actions.
Our specialists present the audit findings during a dedicated meeting for decision-makers.
Using the knowledge and years of experience of our engineers, we help you make optimal decisions, select equipment and technologies, and implement IT solutions consistent with best market practices.
IT Consulting – IT Audit
An IT outsourcing company provides IT support in two areas. The first is maintaining the IT infrastructure, and the second is providing IT consulting services to ensure the client's business development and implementing all measures to improve IT security, ensuring the security of the client's data.
When commencing IT support, an IT audit and security audit are always conducted.
We verify the client's entire infrastructure, including physical access to the server room, external IT security – edge device configuration, VPN, server configuration, backup, battery power (UPS), licensing, PC configuration, antivirus protection, etc.
The audit results in a report demonstrating the company's IT status. The report includes proposed changes that we recommend implementing to support the business and enhance IT security. Most common recommendations:
– changes to the physical access policy for servers,
– implementation of group collaboration based on Microsoft 365, Teams, SharePoint, Planner, etc.,
– changes to the backup policy and implementation of data replication,
– preparation of a Disaster Recovery Plan (DRP) policy,
– tightening the permissions policy, password policy, and resource access,
– implementation of a secure platform for home offices (Fortigate/Cisco routers, VPNs, terminal work, computer security),
– use of colocation, dedicated servers, cloud backup service, cloud replication,
IT Consulting – IT Consultant Examples in Action
IT consulting is sometimes considered computer consulting. Which computer should you choose? Which software should you buy? Support Online has been providing IT support to companies for over twenty years.
Our consultants/engineers/salespeople understand their clients' businesses. Their IT consulting services are designed to support businesses so they can operate more efficiently, faster, and more securely, ensuring they are resilient to outages. After implementing the recommendations provided by our IT audit, we guarantee improved performance across the company.
Changes can often seem quite drastic. Take, for example, a company that manages several hotels. The management team was accustomed to having servers and hotel management systems run locally. This was intended to mitigate the risk of hotel guests waiting for service in the event of an internet outage. This tripled hardware and licensing costs.
However, we proposed moving the servers to a colocation facility and switching the internet provider to Netia, which provided a redundant MPLS connection. Each router has two WANs. One supports fiber optic, the other an LTE card. If the main link fails, the router will automatically switch traffic to the LTE card, along with a VPN connection to the colocation facility.
This solution ensures IT security: dedicated servers in a secure colocation, a redundant internet connection, and a significant reduction in IT costs. All that was left was to configure server replication and implement cloud backup.
IT Consulting – Works Great in Every Company
This understanding of IT consulting, or IT consulting service, works brilliantly.
Another example of changes IT Consulting recommends is implementing group collaboration. The project included migrating email to Microsoft 365, transferring key resources to SharePoint, and using Teams to implement group collaboration for employees in the office and at home. The entire process was repeatedly implemented by Support Online, which specializes in IT support and offers IT consulting.
However, the client's requirement that SharePoint files be shared only with company employees presented a challenge. We needed to find a file sharing tool that would not involve SharePoint.
Data security was a priority here. The system had to be completely private and managed by our client. We used the NextCloud application, based on the Linux operating system. We installed the software on a virtual machine located in a colocation facility. We implemented the solution, trained the person managing file sharing within the organization, and, of course, configured backup.
Support Online, working with numerous companies worldwide, has experienced staff, offers IT consulting services, and provides world-class IT support, particularly administrative support, for its clients.
Professional IT Consulting at Support Online
IT Consulting at Support Online is a professional service that helps organizations understand and effectively leverage technology to achieve their business goals. Our experienced consultants offer assessments of existing IT systems, develop IT strategies, and assist in implementing new technologies.
With our consulting, your company will be able to make IT decisions based on solid data and industry best practices.
At Support Online, we prioritize partnerships with our clients, providing support at every stage of the digital transformation process. From analysis and planning, through implementation, to ongoing management and support, we deliver comprehensive solutions tailored to each client's individual needs. With us, your company will be ready for the challenges of the future.
IT consulting, also known as IT consulting, involves providing specialized advice and support to companies on the use of information technology. Its mission is to ensure that the company uses technology in the most effective manner, which includes the selection, implementation, and management of IT systems. These services may include advice on technology strategy, infrastructure optimization, cloud migration, cybersecurity, data management, and business analytics.
At Support Online, we have a team of experienced IT consultants with in-depth knowledge of the latest technologies and trends. Our goal is to provide clients with the most effective and innovative technology solutions to help them achieve their business goals. With our IT consulting services, companies can focus on their core business while we ensure their technology is state-of-the-art.
IT consulting at Support Online encompasses a wide range of services, including:
- Technology Strategy: Technology strategy advice, including selecting the most appropriate technologies to achieve business goals.
- IT Project Management: Overseeing IT project implementation from start to finish, ensuring they are delivered on time and within budget.
- Cybersecurity: Advising on best practices for security and data protection.
- Cloud Migration: Assisting in the transition to cloud services, including planning and managing the migration process.
- IT Infrastructure Optimization: Advising on optimizing existing IT infrastructure to increase efficiency and reduce costs.
- ERP and CRM Consulting: Assisting in the selection and implementation of ERP and CRM systems that best meet the company's business needs.
- IT Support: Offering on-demand IT support, including resolving technical issues and assisting with IT system management.
- IT Training: Providing training for company employees to improve their technological skills and help them better utilize available IT tools.
- Business Intelligence and Data Analytics: Advising on collecting, analyzing, and interpreting data to make better business decisions.
Choosing Support Online for IT consulting is a choice for unparalleled technical expertise, experience, and innovation. The Support Online team is comprised of experienced IT consultants who can adapt to each client's unique needs and provide tailored solutions.
The first key aspect that sets Support Online apart is their deep understanding of the business. Consultants not only understand technology but also understand how to leverage it to achieve business goals. Whether it's cloud migration, data management, or new system implementation, Support Online consultants always have your best interests at heart.
The second key element is access to the latest technologies and industry best practices. Through constant monitoring of the IT market and ongoing training, Support Online consultants stay current with the latest trends and technologies, allowing them to deliver innovative solutions that truly make a difference.
Finally, Support Online provides ongoing support after project implementation. This allows clients to be confident that they have access to support whenever they need it, which is invaluable in the rapidly changing IT world. Utilizing IT consulting services from Support Online is an investment in your company's future.
An IT company handles a wide range of IT-related activities. Below are some of the main areas they typically cover:
- Consulting Services: IT companies often offer consulting services, helping organizations understand how to effectively leverage technology to achieve their business goals. This includes assessing existing IT systems, developing an IT strategy, and assisting with the implementation of new technologies.
- Software Development: Many IT companies specialize in developing custom software for their clients. This includes developing web and mobile applications, database systems, and integrating with existing systems.
- IT Service Management: IT companies often provide IT infrastructure management services, such as server management, network management, security management, and helpdesk support for users.
- Cloud Services: These days, many IT companies offer cloud-related services such as hosting, data storage, cloud computing, as well as consulting and support for cloud migration.
- Cybersecurity: Protecting customer information and IT systems is a priority for IT companies. They offer services related to network security, security audits, and incident response.
- Data Services: IT companies can offer services related to data management, analysis, and visualization, as well as the development of artificial intelligence and machine learning solutions.
All of these services are designed to help organizations effectively leverage technology to improve their operations, efficiency, and innovation.