PROACTIVERISK
  • > About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • > Assess
    • Framework Audit
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Tenant Assessment
    • Industrial Controls
    • Digital Evidence
    • Table Top Exercises
  • > Train
    • Talent Acquisition
    • Threat Modeling
    • Virtual and Physcial
  • > Manage
    • Fractional CISO
    • 365 Protect
    • Vendor Risk Management
    • Managed Security Awareness
    • Physical Security
    • Custom Software
    • ContinuityXpert
    • Technology Support
  • > Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare

GRAY BEARD BLOG

SHARING RANDOM THOUGHTS ON TECH

how to partner with a new managed services provider (MSP)

11/10/2022

0 Comments

 
For an IT managed services company to effectively take over the helpdesk, operations, and security for a small business with 10-1000 devices as example, several key items and levels of access will need to be provided. This ensures the service provider has all the necessary tools and permissions to manage your IT infrastructure efficiently and securely.

Here's a general checklist:
  1. Network Details:
    • Information about the existing network infrastructure, including diagrams, IP address ranges, DNS details, and network equipment configurations (routers, switches, firewalls).
    • Access to network management tools and platforms.
  2. Hardware and Software Inventory:
    • Detailed list of all IT hardware (servers, computers, printers, mobile devices) including models, specifications, and locations.
    • Comprehensive software inventory, including operating systems, office software, specialized applications, and any custom-developed software.
  3. Access Credentials:
    • Administrator-level access to servers, workstations, network devices, and other critical infrastructure.
    • Credentials for cloud services and SaaS applications used by the business.
  4. Security Policies and Documentation:
    • Existing security policies, procedures, and any compliance documentation.
    • Details of previous security assessments, audits, or breaches, if applicable.
  5. Backup and Disaster Recovery Plans:
    • Access to existing backup solutions and disaster recovery plans.
    • Information on current backup schedules, storage locations, and recovery procedures.
  6. Vendor Contacts and Contracts:
    • Contact details for all relevant vendors, including hardware, software, and service providers.
    • Copies of current contracts and service level agreements (SLAs).
  7. User Accounts and Permissions:
    • List of all user accounts, including administrative and service accounts, with details on their access levels and permissions.
    • Procedures for onboarding and offboarding employees.
  8. Compliance Requirements:
    • Information on any regulatory or industry compliance requirements affecting the IT systems (e.g., GDPR, HIPAA).
    • Previous compliance reports or assessments.
  9. IT Support and Incident Response History:
    • Records of past IT support tickets, common issues, and resolutions.
    • Incident response plans and logs of past security incidents.
  10. Training Materials and Documentation:
    • Existing training materials, operational manuals, and documentation for IT systems and security protocols.
  11. Communication Channels:
    • Preferred tools and protocols for communication between the business and the managed services provider.
By providing this comprehensive set of information and access, the IT managed services company can tailor their support, operations, and security measures to meet the specific needs of your business. It's important to have an initial meeting to discuss and agree upon the scope of services, expectations, and any specific business requirements. When combined with a simple and straighforward master services agreement and work order everyone involved make the transion logistics easy.

We invite you to download our complimentary Cybersecurity Checklist or explore our managed service, ManageIT, by ProactiveRISK for more detailed information. 
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Categories

    All
    CMMC
    COMMUNITY
    TECHTIP

    Tom Brennan

    This is my blog, there are many like it but this one is mine. Enjoy.

    View my profile on LinkedIn

    BLOG Archives

    May 2025
    February 2025
    January 2025
    November 2024
    August 2024
    June 2024
    May 2024
    April 2024
    February 2024
    January 2024
    December 2023
    November 2023
    September 2023
    August 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    August 2022
    April 2022
    August 2021
    March 2021
    January 2021
    August 2020

    RSS Feed

Contact Us
🏢 ​New Jersey Headquarters
290 W Mt. Pleasant Ave, Suite 11309
Livingston, NJ 07039

☎️ 973-298-1160 | GPS Map
Client Portal
ManageIT Remote

​
© COPYRIGHT 2024. ALL RIGHTS RESERVED.
  • > About
    • Mission | People
    • Capabilities Statement
    • Blog
    • 800 lb Gorilla
    • Press & Events
    • Videos
    • Careers
    • Books & Tools
    • Referral Program
    • Portals > >
      • Client Portal
      • Staff Portal
  • > Assess
    • Framework Audit
    • AI Investigate
    • RED/BLUE TEAM
    • Continuous Testing
    • 365 Tenant Assessment
    • Industrial Controls
    • Digital Evidence
    • Table Top Exercises
  • > Train
    • Talent Acquisition
    • Threat Modeling
    • Virtual and Physcial
  • > Manage
    • Fractional CISO
    • 365 Protect
    • Vendor Risk Management
    • Managed Security Awareness
    • Physical Security
    • Custom Software
    • ContinuityXpert
    • Technology Support
  • > Industry
    • State and Local Gov.
    • Legal and Accounting Firms:
    • Financial Technology
    • Healthcare