6 Items to Include in an IT Assessment

Add these 6 important items to your IT assessment checklist to stay one step ahead.

You’re likely already performing IT checks in your business. If you want to make your processes better, create a solid IT assessment checklist that addresses the right things. This proactive approach will help you find and fix problems long before they disrupt your business. Add these 6 important items to your IT assessment checklist to stay one step ahead.

1. Current state assessment

How does your system work right now? You need to understand what processes, endpoints, assets, and policies are in place so you can identify opportunities for improvement. Your current state assessment should look at:

  • Company goals: What’s important to your organization? For example, if customer experience is your mission, that means IT needs to give extra attention to customer-facing systems. Make sure your IT approaches match your company’s priorities.
  • Existing documentation: Round up all of your SOPs, logs, and other IT documentation. Is anything missing? Is the information current? Is the documentation helpful?
  • Compliance: Does your organization have to comply with HIPAA, SOC 2, or other requirements? Understand what responsibilities fall on IT for compliance. When you conduct a current state assessment, you’ll get a baseline of what you need to accomplish. Essentially, it should explain why you’re doing the assessment and what your team needs to prioritize.

2. Inventory your software and hardware assets

Once you understand your current state, take a detailed inventory of all of the software and hardware in your business. This includes assets like:

  • Laptops
  • Mobile phones
  • Servers
  • Routers
  • Switches
  • Antivirus software
  • Access points
  • Desktop software
  • Operating systems and their versions
  • Printers
  • Scanners
  • Conference room equipment

By inventorying your assets, you’ll quickly realize what assets need to be upgraded, removed, or optimized. Plus, it makes security much easier when you know what you need to secure.

3 . Data storage and recovery

An information technology assessment should also look at your data storage and recovery practices. The purpose of this is to understand where and how you store critical data. This part of the checklist should cover:

  • Cloud storage: Cloud storage is efficient, but it does come with security concerns. Understand how data moves through the cloud, where you store it, and how you secure this data. You should also determine what data stays on-site and what data belongs in the cloud.
  • Disaster recovery: Fire, floods, and natural disasters can destroy your operations. Assess how redundant your systems are in the case of significant disruption. This means analyzing recovery times, roles, and backup policies.
  • Backups: Where do you back up your data? How often? Consider backing up your servers at least once a week and building in a few off-site backups.
  • Compliance: Do you need to meet backup retention requirements for key data? For example, you need to store payroll data for at least 7 years. From legal transactions to instant messaging, you’re likely on the hook for backup requirements. Make sure your systems align with these compliance requirements.

4. User access and experience

Human activity has a big impact on network infrastructure performance. Your IT assessment checklist should determine how users access your systems and how you can improve their overall experience. Ask other employees how they use the system right now. Get a feel for what they enjoy and what changes they would like to see. You should also assess your business’s:

  • Onboarding practices: Does your organization have solid IT training for newcomers? Or ongoing training for existing employees? Have a plan for ongoing employee training so your business can fend off cyber attacks more easily.
  • Password strength: You don’t want employees using “password” as their password. Your network infrastructure should create secure, complex passwords for your team. Use a password manager and password generator for your entire team to maximize security without harming their experience.
  • Inefficiencies: Are users working in the most efficient way possible? For example, does your business require a lot of manual data entry? It’s IT’s responsibility to identify workflow inefficiencies and find a way to improve collaboration with technology.


5. Upgrade schedule

When you buy software or hardware, you don’t just have to worry about the upfront cost. Every asset requires upgrades and maintenance. This section of your information technology assessment should look at:

  • Which assets need upgrades.
  • The upgrade or maintenance schedule for every asset.
  • The cost of maintenance or upgrades per asset and as a whole.
  • The costs associated with onboarding new employees, devices, or workstations.

6. Gap Analysis

After assessing your infrastructure, you should perform a gap analysis. This identifies areas where you can improve or strengthen your network infrastructure. A gap analysis helps you bridge the gap between where you are today and where you need to be. This way, you conclude the IT assessment with an actionable plan for addressing any issues.



Information provided in part by Lucid Software Inc.

Please help us improve our website by providing your feedback