IT Audits

IT Audits can help identify problems before they become reality. With the numerous amount of new SEC and HIPAA laws and regulations, you can stay ahead of the curve and ensure your business is working within the safeguards of the law and in compliance with all standards of your industry.

 

By definition, An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure.  During an IT Audit, CCS will evaluate all areas of your business and it’s relation to technology.

In addition, if you are unaware of what you currently have running in your environment, what your users and employees have installed on their workstations, or are between IT firms, an audit is the place to start in identifying these issues.

CCS will provide a detailed report on the following areas:

IT Security

  • What security measures are in place
    • Passwords policies, Antivirus, Web Filtering, Firewall
  • Where can security be improved
  • Where are the current risks that need immediate addressing

Systems and Architecture

  • Server inventory
    • Assess the stability and performance of all servers
  • Workstation inventory
  • Networking Device inventory
    • Security assessment on all networking devices
    • Attempt brute force and hacking routines on the network to identify flaws and possible breach points
  • Assess all online and cloud based services

Application Inventory

  • Understand what applications are installed and running on your network
  • Document warranty and license information for all business software
  • Recommend tools to prevent the unauthorized installation of rogue software into your network

 

View our fact sheet and sample audit reports such as:

  • Hardware Inventory
  • Hardware Upgrade Planning Report
  • Boot Time and Log in Results
  • Installed Operating Systems
  • Devices Managed by CCS Insight
  • Microsoft Patch Overview
  • Resource Utilization
  • Firewall Incidents
  • Remote Control Usage
  • Security Alerts
  • Networked Printers
  • Shared Folders
  • Software Inventory
  • Application Availability
  • Antivirus Status
  • Data Protection
  • Downtime Cost
  • Executive Summary
  • Health Overview
  • Network Assessment
Back to Top