Detailed checklist, divided into organisational and technical points.
- Define who is in charge of IT
- Define the role concept
- Define the access rights for each employee
- Check and restrict management access rights as well
- Check the (local) administrator access
- Change default passwords
- Define the processes for when employees join and leave the company
- Which employees can access which folders?
- Create password rules for employees
- Link and restrict defined roles with/using the access rights
Why do all of this?
Your guarantee for secure, functioning IT.
Who can access which data? Those responsible have to ask themselves this question not only for security reasons, but also because of various legal requirements. After all, confidential figures or information should not be accessible to just anyone, not even if these are trustworthy people like your employees. But the devil is in the details. First of all, you need to consider how your data should be structured in a meaningful way. Especially if the data is not simply stored on the personal PC – as recommended – but rather on a server or in the cloud, it should be stored using a logical structure and with an understandable name. The reason: data can only be approved for certain user groups if it is stored in a really clearly structured way.
Who will support me in my region?
- Alle Regionen
- Zürich
- Ostschweiz
- Bern & Nordwestschweiz
- Zentralschweiz
- Romandie
- Ticino
- Wallis
- Österreich

Vision-Inside AG

CSF Computer Solutions Facility AG

TurnKey Services AG

ANOMAL GmbH

CloudSide AG

insysta GmbH

Rey Informatik AG

TAMOS AG

netshape AG

Zubler & Partner AG

Digilan AG

Netrics Thun AG

diag Dienstleistungen AG

Netsafe AG

sl.one AG

Continis AG

care4IT.ch AG

Bögli ICT AG

Selution AG

eastphone ag

Dreikom AG

United Security Providers AG

Lexxton AG

inconet technology AG

Vision-Inside AG

ANOMAL GmbH

Rey Informatik AG

Zubler & Partner AG

Netrics Thun AG

diag Dienstleistungen AG

Continis AG

care4IT.ch AG

Bögli ICT AG

eastphone ag

Lexxton AG

inconet technology AG

Vision-Inside AG

Rey Informatik AG

TAMOS AG

netshape AG

diag Dienstleistungen AG

Netsafe AG

sl.one AG

Bögli ICT AG

eastphone ag

inconet technology AG

Vision-Inside AG

CSF Computer Solutions Facility AG

Zubler & Partner AG

Digilan AG

Netrics Thun AG

Selution AG

Dreikom AG

United Security Providers AG

inconet technology AG