Download presentation
Presentation is loading. Please wait.
1
Technology Audit Brandon Hall
2
Agenda We will talk about why we are doing tech audits
We will discuss what a tech audit is, what to expect, and what the process looks like We will discuss what the deliverables are after a tech audit has been completed And we will discuss follow-up steps on action items
3
What you should gain You will know why we are doing tech audits
You will understand what a tech audit is, how it is done, and what to expect when we do one You will know what we expect once a tech audit is completed and you have your deliverables in hand
4
Why do we audit? You all should be reviewing your office cyber security, because FINRA and the SEC are talking heavily about cyber There are fundamental pieces of knowledge that all of you need to have to be safe and identify anomalies Your data is valuable and your clients are our clients, and it is up to all of us to keep their data safe We chose to offer this as a free included service instead of making you do your own audits and provide documentation from a third party auditing company that you would pay for
5
Technology Audit – what to expect
We will expect you to know: What is on your network What security software you have and is it up to date Who is your internet service provider How to get us remote access and/or install and run a piece of software for the actual audit
6
Technology Audit – overview
You will be asked a series of questions We will run an auditing program that tells us if your software is outdated, if there are patches missing, and the general wellbeing of the machine We will review your network configuration We will review your hardware on the network and their patch levels
7
So? What do you actually do?
We run a program called Belarc Advisor One of us gets on your machines and looks over settings, software, network neighbors, IP addresses, etc. We ask questions about what certain things are that are plugged into your network
8
Tech Audit – Repercussions
We will tell you what the status is of your systems We will tell you the status of your network We will provide an inventory of discovered devices We will provide a list of software installed on your devices We will provide a breakdown of what we think should be fixed
9
So? What do you actually do? (cont.)
We will remotely connect to each machine and run the software if we need to, and do an overall assessment of the health of the systems We will provide a breakdown of all the devices on your network and how they are connected in a diagram and a summary of each machine, along with an assessment report and any recommendations
10
So? What do you actually do? (cont.)
We will determine what things are on your network We will account for all IP addresses used and listed We will discover your ISP and modem brand We will discover your current external facing IP address We may do port scanning or a full network scan
11
So? What do you actually do? (cont.)
We will answer any questions you may have as we are doing the audit with regard to security or anything else tech We can then schedule a time to go over the results and talk about any tech that may increase your efficiency, help make you more mobile, keep you safer, etc.
14
Best practices for your network
Segment wireless and wired networks. If you must let others on your wireless that you also have machines used for work, establish a guest network and give the password out for that, not your company wireless network. Understand when you have a wireless anything, that device will have the potential for flawed firmware and will need updated. Set passwords on your devices and don’t write them down on a paper under your keyboard or tape them to the device.
15
Questions?
16
Belarc Deep Dive
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.