Detailed checklist, divided into organisational and technical points.
- Define who is in charge of IT
- Define the role concept
- Define the access rights for each employee
- Check and restrict management access rights as well
- Check the (local) administrator access
- Change default passwords
- Define the processes for when employees join and leave the company
- Which employees can access which folders?
- Create password rules for employees
- Link and restrict defined roles with/using the access rights
Why do all of this?
Your guarantee for secure, functioning IT.
Who can access which data? Those responsible have to ask themselves this question not only for security reasons, but also because of various legal requirements. After all, confidential figures or information should not be accessible to just anyone, not even if these are trustworthy people like your employees. But the devil is in the details. First of all, you need to consider how your data should be structured in a meaningful way. Especially if the data is not simply stored on the personal PC – as recommended – but rather on a server or in the cloud, it should be stored using a logical structure and with an understandable name. The reason: data can only be approved for certain user groups if it is stored in a really clearly structured way.
Who will support me in my region?
- Alle Regionen
- Zürich
- Ostschweiz
- Bern & Nordwestschweiz
- Zentralschweiz
- Romandie
- Ticino
- Wallis
- Österreich
Vision-Inside AG
CSF Computer Solutions Facility AG
TurnKey Services AG
ANOMAL GmbH
CloudSide AG
insysta GmbH
Rey Informatik AG
TAMOS AG
netshape AG
Zubler & Partner AG
Digilan AG
Netrics Thun AG
diag Dienstleistungen AG
Netsafe AG
sl.one AG
Continis AG
care4IT.ch AG
Bögli ICT AG
Selution AG
eastphone ag
Dreikom AG
United Security Providers AG
Lexxton AG
inconet technology AG
Vision-Inside AG
ANOMAL GmbH
Rey Informatik AG
Zubler & Partner AG
Netrics Thun AG
diag Dienstleistungen AG
Continis AG
care4IT.ch AG
Bögli ICT AG
eastphone ag
Lexxton AG
inconet technology AG
Vision-Inside AG
Rey Informatik AG
TAMOS AG
netshape AG
diag Dienstleistungen AG
Netsafe AG
sl.one AG
Bögli ICT AG
eastphone ag
inconet technology AG
Vision-Inside AG
CSF Computer Solutions Facility AG
Zubler & Partner AG
Digilan AG
Netrics Thun AG
Selution AG
Dreikom AG
United Security Providers AG
inconet technology AG