IT audit
and consulting

Gain control
and security
IT audits and consulting for companies and institutions. We analyze, advise, and help implement solutions that increase the efficiency, security, and scalability of your IT systems. Comprehensive audits. Practice-based recommendations. Technology development support.
Why is it worth it? An IT audit is a comprehensive assessment of the IT environment for compliance with applicable standards, best practices, and information security requirements. It allows us to identify errors, security vulnerabilities, and inefficient processes within the IT infrastructure. As a result, the client receives a clear and objective picture of the state of their IT infrastructure and the functioning of the IT department, along with specific recommendations for improvements and optimization. What do you gain?
Full system diagnosis – a complete picture of the real state of the IT infrastructure. Greater security – identifying weak points and helping to eliminate them. Cost optimization – identifying unnecessary expenses and underutilized resources. More efficient operation – improved performance and stability of the entire IT environment. Greater customer confidence – a current audit shows that your company cares about data security.
Find out how we can help your businessFind out how we can help your business
How we work
IT audits at Support Online are conducted by experienced IT engineers who solve real-world customer problems every day. We examine all key areas—from networks, servers, and backups to security and compliance. Each audit concludes with a risk assessment report and recommendations for improvements. We advise on how to implement changes safely and effectively, and after the audit, we offer support in implementing the recommendations.
1 Analysis
of the IT environment, networks, servers, workstations and security.
2 Verification
of security and backup policies.
3 Rate
the configuration of cloud services.
4 Report
containing recommendations and a detailed action plan.
5 Consulting
on implementation and employee training.
Audit scope The scope of the audit covers all areas crucial for the security and efficiency of your systems:
What do we check?
LAN/WAN and Wi-Fi network security, configuration of Windows and Linux servers, backup, data recovery and business continuity policies (DRP/BCP), cloud services audit (IaaS, PaaS, SaaS), verification of Active Directory configuration and identity systems, encryption, certificates and key management, license compliance and IT documentation.
Our advantages

A team you can trust.

Proactive approach – we act before problems arise.

Experienced auditors and consultants – practitioners, not theorists.

Partnerships with IT vendors – better pricing and shorter lead times.

In-house purchasing and service department – ​​fast order and repair fulfillment.

Dedicated technical and sales support.

Regular training and team updates. Transparency and progress reporting.

Price-list
Basic plan from 12 000 PLN IT environment overview
60 hours of auditors' work report and recommendations
Contact us
Popular plan from 28 000 PLN Audit with documentation (in terms of ISO, DORA, NIS2)
80 hours of auditors' work as-built documentation and recommendations
Contact us
Premium plan from 60 000 PLN Audit with documentation and full equipment inventory
80 hours of auditors' work as-built documentation and recommendations hardware inventory up to 4,000 devices
Contact us
Approximate prices depend on the complexity of the audit.
Find out how we can
help your business
Order a free consultation
Customers about us
ASTRA S.A.
Support Online Sp. z o.o. perfectly understands the specifics of our business needs and always provides solutions perfectly tailored to our requirements. Read more
DR GERARD
Thanks to their advanced solutions and 24/7 monitoring of IT systems, we can be sure that our data is always protected against all threats. Read more
CHICCO
This company's professional and friendly approach to customer service, as well as its response time to requests, reinforces our belief that we are working with professionals. Read more
VOLVO
We wholeheartedly recommend Support Online as an IT company worth recommending when it comes to professional IT outsourcing. Read more
LEGO
Our partnership with Support Online began in 2013. What sets the company apart from the competition is its professionalism, experience, and punctuality. Read more
BARILLA
We particularly value their responsiveness and willingness to provide support in crisis situations. Support Online has repeatedly demonstrated their ability to respond under time pressure, and their interventions have always led to a quick and effective resolution of the problem. Read more
MEDTRONIC
All services are performed by Online Support in a timely manner and with due professional care. Online Support's staff is experienced and highly qualified. Read more
STEPSTONE
I highly recommend Support Online as a reliable and trustworthy business partner. Read more
MDDP Outsourcing
Throughout our partnership, Support Online has continually adapted to the dynamic changes within our organization. In 2017, the MDDP Outsourcing team consisted of 170 people, and by 2025, this number was expected to grow to 300. Read more
STADA POLAND
We wholeheartedly recommend Support Online as a reliable and professional partner in IT services for companies in the pharmaceutical industry. Read more
Imed Poland
Our security measures and backup systems ensure the security of data stored in the system. Any issues reported by our employees to Support Online sp. z o.o. are forwarded to the appropriate departments and promptly resolved online or by a dedicated support representative.
Previous Next
Your IT.
our
support.
Contact us

The administrator of your personal data is Support Online sp. z o.o. Your personal data will be processed to respond to your inquiry and, if you consent, also to send the SOL newsletter. You can read about the detailed rules for personal data processing by our organization in our Privacy Policy.

FAQ

Every IT audit procedure includes several key elements that are crucial from the perspective of the company owner or management. It's worth using the list below when searching for a potential IT audit provider and verifying that each issue will be discussed in depth.

1. IT Audit: Verifying Backup Performance. We begin by verifying whether backups are being performed at all and whether it is possible to restore the company's key IT systems within a specified timeframe based on the existing backup.

2. IT Audit: Developing a Backup Policy. Over 70% of clients for whom we have performed an IT audit either did not have any backups or their condition was beyond recovery. Therefore, we create a new backup policy. This document must include the following information:

  • what resources (i.e., physical servers, virtual servers) are covered by the backup procedure;
  • how the backup is performed – here, we always recommend a comprehensive approach, i.e., backing up entire servers;
  • in what locations and on what devices are backups stored?
  • what is the backup schedule?
  • how often should test data recovery be performed?

3. IT Audit: Determining the company's recovery time in the event of a critical failure? This is crucial information for every company owner or management. Unfortunately, in many cases, attention to this topic only arises during an IT disaster, when the entire organization simply ceases to function. The company's recovery time in the event of a critical failure can be determined based on the implemented backup policy. While this will be an estimate, it provides a tangible indication of the IT department's capabilities.

An information security audit is a process that involves assessing how an organization's data and information are protected. The goal is to identify potential security gaps and risks associated with data loss or breach. The audit may include reviewing access management, network security, physical security, risk management practices, and security policies and procedures. At Support Online, we offer a range of services related to information security audits, including:

  1. Security Policy and Procedure Assessment: We verify that current policies and procedures are effective and compliant with industry best practices.
  2. Penetration Testing: We conduct tests that simulate attacks on IT systems to identify vulnerabilities.
  3. Risk Assessment: We analyze potential information security threats and assess their likelihood and potential impact.
  4. Consulting: Based on the audit results, we provide recommendations for improving the organization's information security.

An IT audit is a detailed analysis of an organization's IT systems to assess their operation, security, and effectiveness. This process involves examining various aspects of the IT infrastructure, including hardware, software, networks, operational procedures, data resources, and security features.

An IT audit can help identify potential issues or vulnerabilities that may impact an organization's operations, as well as ensure compliance with regulations and industry standards.

At Support Online, we have experienced IT specialists who specialize in conducting IT audits. Our team has extensive experience and technical expertise to effectively assess and optimize our clients' IT systems. Our approach to IT audits allows us to provide our clients with valuable feedback that will help them improve the efficiency and security of their IT infrastructure.

In our approach to IT project implementation at Support Online, we focus on the following key stages:

  1. Identification and inventory of current IT systems: We understand the client's infrastructure to better understand its operation and needs.
  2. Defining client requirements from a technical and economic perspective: We understand the client's needs and tailor our services to those requirements.
  3. Developing project briefs: We prepare a strategy to achieve project goals.
  4. Planning and implementing data center migration: We migrate client resources to a secure and reliable data center infrastructure.
  5. Implementing new resources in the data center: We strengthen the client's IT infrastructure by adding new resources as needed.
  6. Preparing a technical proposal for specific solutions: We propose the most appropriate solutions that best fit the client's needs.
  7. Implementing the selected technical concept, including domain hosting, applications, racks, virtual and physical servers.
  8. Virtualizing existing and new environments using VMWare and Hyper-V technologies.
  9. Developing post-project documentation, including policies, procedures, and instructions.
  10. Performing technical work, including configuration.
  11. Planning administrative activities to reduce the workload of local IT teams.
  12. Advanced systems management, with the goal of outsourcing all administrative tasks.
  13. Planning backups to ensure data security.
  14. Planning monitoring systems to ensure continuous control over systems.
  15. Planning the maintenance of the entire solution, ensuring the reliability and efficiency of the IT infrastructure.

Support Online conducts IT audits most often in two situations. The first, and most common, situation is the establishment of a partnership as part of a comprehensive IT service. In this case, the IT audit serves as an opening balance and simultaneously determines the direction of changes in the client's IT infrastructure for the next 3-5 years.

For Support Online, where IT outsourcing is the foundation of the business, this is a critical moment. Even a small error in diagnosing the client's needs and/or selecting IT solutions can spell failure in further cooperation. Every company where IT services are a key source of revenue must prioritize long-term relationships, as only these guarantee further business growth.

The second scenario involves clients verifying the performance of their internal IT department. This involves verifying operational tasks and long-term concepts for the company's IT development, which should originate from the IT department. We often discuss and propose ideas such as:

  • company digitalization, i.e., implementing solutions enabling the transition to remote work, such as terminal services;
  • IT system consolidation within a single ecosystem, e.g., Office 365 (Microsoft 365);
  • implementation of tools from the "cloud solutions for businesses" catalog: private cloud, cloud replication, or cloud backup; 
  • preparation and implementation of a disaster recovery plan (DRC): an IT business continuity plan;
  • increasing the organization's resilience to cybercriminal attacks through, among other things, anti-phishing training;

IT audit is a broad concept, and as of yet, consistent standards for the service itself have not been developed. This is clearly evident in the example of requests for quotes submitted to Support Online. On the one hand, we have a rather large (and at the same time interesting) range of terms used by clients:

  1. IT systems audit;
  2. IT infrastructure audit;
  3. IT communications audit;
  4. IT environment audit;
  5. IT security audit, including information security;
  6. IT security audit;
  7. including: audits of computer hardware, LAN networks, license compliance, computer networks, etc.

On the other hand, clients have a very wide range of requirements, which are difficult to describe here. Perhaps someday in the future, IT audits will be precisely categorized, as is the case with audits of, for example, financial statements. A positive aspect is that most IT companies have developed their own very precise definition of IT audits, based on their experience. For customers, this means carefully reviewing the service's specifications at an early stage of selecting a contractor. So let's see what Online Support has to offer in this regard.

Twenty years of experience in providing IT services and completing hundreds of audits have allowed us to develop an effective collaboration model. Our IT audit offerings include IT infrastructure analysis, security assessments, a review of IT processes and procedures, and recommendations for improvement. The audit can cover all or part of your company's IT areas.

An IT audit helps identify and fix weaknesses in IT systems, improve data security, increase operational efficiency, and ensure compliance with regulations and industry standards.

Our IT auditors have many years of experience, relevant industry certifications, and specialized knowledge of the latest technologies and security standards.

The IT audit process includes an analysis of IT systems, a documentation review, employee interviews, and system testing. The duration of the audit depends on the scope and complexity of the company's IT infrastructure, typically lasting from several days to several weeks.

Before starting the audit, we will need detailed information about your company's IT systems, IT infrastructure, security policies, and license management.

IT audit costs depend on the scope and detail of the audit. We prepare individual quotes based on the client's specific needs and requirements.

Ideally, once a year or after major changes to the IT infrastructure or IT department

No. We complete most activities without disrupting users.

Yes. We always determine the scope individually.

Yes. We advise and assist in implementing audit recommendations.

We offer audits of IT systems, IT infrastructure, ICT, IT environment, IT security (including information security), IT security, computer hardware, LAN, license compliance, and computer network.

The result of an IT audit is a detailed report on the work performed, along with a risk assessment and our recommendations for corrective or optimization actions.

IT Audit Scope in Online Support

1. Audit Scope from a Functional Perspective:

  • Creating Data Backups
  • Company IT Security
  • Physical Security of Network Devices, Servers, and Cloud Computing
  • Workstation Security and Operation
  • Developing a Company IT Development Strategy

2. Audit Scope from an Audited Area (Auditor):

2.1 WAN Audit

  • Verification of Contracts with the Internet Service Provider
  • Verification of WAN Connection Speed ​​and Quality
  • Verification of Router and Firewall Configuration

2.2 LAN Audit

  • Verification of Structured Cabling Condition
  • Verification of Switch Configuration
  • Verification of Access Point and Wi-Fi Network Configuration
  • Verification of Virtual Network/VLAN Configuration

2.3 Inspection of Server Rooms and Intermediate Distribution Points

  • Verification of Server Room Access Procedures
  • Verification of Cooling and Firefighting Equipment in Rooms

2.4 Audit Windows Servers

  • Security Configuration Check – Best Practices
  • Verification of Warranty Services
  • Log Check
  • Checking Services and Processes Running on Servers
  • Checking Applications Installed on Servers
  • Checking Updates Installed on Servers
  • Checking Backup Configuration for Servers

2.5 Linux/Unix Server Audit

  • Security Hardware Configuration Check
  • Verification of Warranty Services
  • Checking Server Logs
  • Checking Services Running on Servers
  • Checking Updates Installed on Servers
  • Checking Backup Configuration for Servers

2.6 NAS/SAN Storage Audit

  • Security Hardware Configuration Check
  • Verification of Warranty Services
  • Log Check
  • Firmware Update Check
  • Checking Backup Configuration

2.7 Active Directory Audit

  • Checking Active Directory Forest and Domain Versions
  • Domains and Trusts – number and direction
  • Domain check – dcdiag
  • Replication verification
  • Site and subnet check without assignment
  • Password policy
  • GPO policy configuration check

2.8 Auditing cloud identity services: EntraID, Google, AWS, OKTA, and others

  • Verifying account and group creation
  • Multi-factor authentication (MFA)
  • Trust relationships
  • Dynamic groups
  • Additional attributes

2.9 Auditing cloud computing services (Iaas/Paas/Saas)

  • Types of cloud services used by the company
  • Method of accessing cloud services and collaborating with the on-premises environment (hybrid)
  • Cloud resource audit
  • Cloud environment security settings

2.10 Cryptography audit

  • Disk encryption for physical and virtual servers
  • Encryption of user computers and mobile devices
  • Backup encryption Security
  • Use of certificates in web and network services
  • Use of cryptographic cards/hardware keys
  • PKI architecture
  • Key management audit

2.11 PC and laptop audit

  • Checking the security configuration of the computer;
  • Checking and verifying the licenses of applications installed on the computer;

2.12 Checking IT procedures and documentation

  • Verifying backup procedures
  • Verifying disaster recovery procedures
  • Verifying business continuity procedures
  • Verifying security policy
  • Verifying employee hiring/termination procedures
  • Verifying computer network diagram documentation
  • Verifying key application documentation

 

IT audit report, post-audit recommendations, and implementation

The result of the IT audit is a detailed report on the work performed, along with a risk assessment and our recommendations for corrective or optimization actions.

Our specialists present the audit findings during a dedicated meeting for decision-makers.

Using the knowledge and years of experience of our engineers, we help you make optimal decisions, select equipment and technologies, and implement IT solutions consistent with best market practices.

IT Consulting – IT Audit

An IT outsourcing company provides IT support in two areas. The first is maintaining the IT infrastructure, and the second is providing IT consulting services to ensure the client's business development and implementing all measures to improve IT security, ensuring the security of the client's data.

When commencing IT support, an IT audit and security audit are always conducted.

 

We verify the client's entire infrastructure, including physical access to the server room, external IT security – edge device configuration, VPN, server configuration, backup, battery power (UPS), licensing, PC configuration, antivirus protection, etc.

The audit results in a report demonstrating the company's IT status. The report includes proposed changes that we recommend implementing to support the business and enhance IT security. Most common recommendations:

– changes to the physical access policy for servers,
– implementation of group collaboration based on Microsoft 365, Teams, SharePoint, Planner, etc.,
– changes to the backup policy and implementation of data replication,
– preparation of a Disaster Recovery Plan (DRP) policy,
– tightening the permissions policy, password policy, and resource access,
– implementation of a secure platform for home offices (Fortigate/Cisco routers, VPNs, terminal work, computer security),
– use of colocation, dedicated servers, cloud backup service, cloud replication,

 

IT Consulting – IT Consultant Examples in Action

IT consulting is sometimes considered computer consulting. Which computer should you choose? Which software should you buy? Support Online has been providing IT support to companies for over twenty years.

Our consultants/engineers/salespeople understand their clients' businesses. Their IT consulting services are designed to support businesses so they can operate more efficiently, faster, and more securely, ensuring they are resilient to outages. After implementing the recommendations provided by our IT audit, we guarantee improved performance across the company.

Changes can often seem quite drastic. Take, for example, a company that manages several hotels. The management team was accustomed to having servers and hotel management systems run locally. This was intended to mitigate the risk of hotel guests waiting for service in the event of an internet outage. This tripled hardware and licensing costs.

However, we proposed moving the servers to a colocation facility and switching the internet provider to Netia, which provided a redundant MPLS connection. Each router has two WANs. One supports fiber optic, the other an LTE card. If the main link fails, the router will automatically switch traffic to the LTE card, along with a VPN connection to the colocation facility.

This solution ensures IT security: dedicated servers in a secure colocation, a redundant internet connection, and a significant reduction in IT costs. All that was left was to configure server replication and implement cloud backup.

IT Consulting – Works Great in Every Company

This understanding of IT consulting, or IT consulting service, works brilliantly.

Another example of changes IT Consulting recommends is implementing group collaboration. The project included migrating email to Microsoft 365, transferring key resources to SharePoint, and using Teams to implement group collaboration for employees in the office and at home. The entire process was repeatedly implemented by Support Online, which specializes in IT support and offers IT consulting.

However, the client's requirement that SharePoint files be shared only with company employees presented a challenge. We needed to find a file sharing tool that would not involve SharePoint.

Data security was a priority here. The system had to be completely private and managed by our client. We used the NextCloud application, based on the Linux operating system. We installed the software on a virtual machine located in a colocation facility. We implemented the solution, trained the person managing file sharing within the organization, and, of course, configured backup.

Support Online, working with numerous companies worldwide, has experienced staff, offers IT consulting services, and provides world-class IT support, particularly administrative support, for its clients.

Professional IT Consulting at Support Online

IT Consulting at Support Online is a professional service that helps organizations understand and effectively leverage technology to achieve their business goals. Our experienced consultants offer assessments of existing IT systems, develop IT strategies, and assist in implementing new technologies.

With our consulting, your company will be able to make IT decisions based on solid data and industry best practices.

At Support Online, we prioritize partnerships with our clients, providing support at every stage of the digital transformation process. From analysis and planning, through implementation, to ongoing management and support, we deliver comprehensive solutions tailored to each client's individual needs. With us, your company will be ready for the challenges of the future.

 

IT consulting, also known as IT consulting, involves providing specialized advice and support to companies on the use of information technology. Its mission is to ensure that the company uses technology in the most effective manner, which includes the selection, implementation, and management of IT systems. These services may include advice on technology strategy, infrastructure optimization, cloud migration, cybersecurity, data management, and business analytics.

At Support Online, we have a team of experienced IT consultants with in-depth knowledge of the latest technologies and trends. Our goal is to provide clients with the most effective and innovative technology solutions to help them achieve their business goals. With our IT consulting services, companies can focus on their core business while we ensure their technology is state-of-the-art.

IT consulting at Support Online encompasses a wide range of services, including:

  1. Technology Strategy: Technology strategy advice, including selecting the most appropriate technologies to achieve business goals.
  2. IT Project Management: Overseeing IT project implementation from start to finish, ensuring they are delivered on time and within budget.
  3. Cybersecurity: Advising on best practices for security and data protection.
  4. Cloud Migration: Assisting in the transition to cloud services, including planning and managing the migration process.
  5. IT Infrastructure Optimization: Advising on optimizing existing IT infrastructure to increase efficiency and reduce costs.
  6. ERP and CRM Consulting: Assisting in the selection and implementation of ERP and CRM systems that best meet the company's business needs.
  7. IT Support: Offering on-demand IT support, including resolving technical issues and assisting with IT system management.
  8. IT Training: Providing training for company employees to improve their technological skills and help them better utilize available IT tools.
  9. Business Intelligence and Data Analytics: Advising on collecting, analyzing, and interpreting data to make better business decisions.

Choosing Support Online for IT consulting is a choice for unparalleled technical expertise, experience, and innovation. The Support Online team is comprised of experienced IT consultants who can adapt to each client's unique needs and provide tailored solutions.

The first key aspect that sets Support Online apart is their deep understanding of the business. Consultants not only understand technology but also understand how to leverage it to achieve business goals. Whether it's cloud migration, data management, or new system implementation, Support Online consultants always have your best interests at heart.

The second key element is access to the latest technologies and industry best practices. Through constant monitoring of the IT market and ongoing training, Support Online consultants stay current with the latest trends and technologies, allowing them to deliver innovative solutions that truly make a difference.

Finally, Support Online provides ongoing support after project implementation. This allows clients to be confident that they have access to support whenever they need it, which is invaluable in the rapidly changing IT world. Utilizing IT consulting services from Support Online is an investment in your company's future.

 

An IT company handles a wide range of IT-related activities. Below are some of the main areas they typically cover:

  1. Consulting Services: IT companies often offer consulting services, helping organizations understand how to effectively leverage technology to achieve their business goals. This includes assessing existing IT systems, developing an IT strategy, and assisting with the implementation of new technologies.
  2. Software Development: Many IT companies specialize in developing custom software for their clients. This includes developing web and mobile applications, database systems, and integrating with existing systems.
  3. IT Service Management: IT companies often provide IT infrastructure management services, such as server management, network management, security management, and helpdesk support for users.
  4. Cloud Services: These days, many IT companies offer cloud-related services such as hosting, data storage, cloud computing, as well as consulting and support for cloud migration.
  5. Cybersecurity: Protecting customer information and IT systems is a priority for IT companies. They offer services related to network security, security audits, and incident response.
  6. Data Services: IT companies can offer services related to data management, analysis, and visualization, as well as the development of artificial intelligence and machine learning solutions.

All of these services are designed to help organizations effectively leverage technology to improve their operations, efficiency, and innovation.

Free consultation
22 335 28 00