How to know if your IT provider is doing enough

by Jon Lober | NOC Technology

10 criteria for evaluating your IT provider.

In today’s digital landscape, ensuring that your IT provider meets the necessary security and operational standards is crucial for protecting your business. But you’ve hired an IT company precisely because you don’t have the time or knowledge to deal with it yourself. So how do you know if your provider is doing enough?


Here are some key criteria to evaluate whether your IT provider is adequately safeguarding your systems and data.


1. You have on- and offsite backups

A robust backup system is your first line of defense against data loss. Having both onsite and offsite backups ensures that even if a catastrophic event occurs—such as a fire or a ransomware attack—you still have access to your data. If your IT provider only offers one type of backup, it may leave your organization vulnerable to data loss. A comprehensive backup strategy should include redundancy, ensuring that your data is protected from various potential threats.


2. Your backups have been tested recently

You won’t know that your systems are backing up correctly until you need them, right? Regularly testing your backup systems is vital to ensure they function as intended. If your last backup test was conducted more than three months ago, it raises a red flag. An untested backup could fail when you need it most, leaving you at risk. A proactive IT provider will routinely check the integrity of backups and verify that they can be restored quickly and effectively.


3. There are only two admins (us and them)

Limiting the number of domain admin accounts is essential for maintaining security. If your IT provider has not implemented this practice, it increases the risk of unauthorized access to your systems. By having only a couple of domain admin accounts, you can better monitor and manage access to sensitive information, reducing the likelihood of breaches caused by insider threats or compromised credentials.


4. You have remote access

Remote management of network switches and access points is crucial for ensuring that your IT provider can quickly address issues as they arise. If your provider is not set up to manage these devices remotely, they may struggle to maintain optimal network performance, leaving your organization vulnerable to downtime. Remote management allows for timely updates and security patches, enhancing overall network security.


5. Your firewall has active security services

A firewall serves as a primary barrier against cyber threats. If your IT provider hasn’t implemented active security services, such as intrusion detection, malware protection, and real-time monitoring, your network could be at risk. An effective firewall should not only block unauthorized access but also actively monitor and respond to potential threats, providing an additional layer of security.

Need more help finding the right IT support company?


Start with a quality list of questions from industry experts. We'll give you our top 10 questions that we think you need to use in any opening interview with a potential IT partner (plus a few bonus follow-up questions). Beyond just a script, we explain why these questions are important to you as you find your tech soul mate.


Get the Guide

6. Your guest Wi-Fi is segmented from your primary network

Segmentation of guest Wi-Fi from your private network is a critical security measure. If your IT provider hasn’t set up this segmentation, you may be exposing your internal systems to unnecessary risks. Guest networks should be isolated to prevent unauthorized access to sensitive data. Proper segmentation protects your internal systems while allowing guests to access the internet safely.


7. You have MFA set up on all Microsoft 365 accounts

Multi-Factor Authentication (MFA) adds an essential layer of security by requiring users to provide two or more verification factors to gain access. If your IT provider hasn’t implemented MFA for all Microsoft 365 accounts, you’re at a heightened risk of unauthorized access. MFA significantly reduces the chances of credential theft and strengthens overall account security.


8. You have a defined onboarding and offboarding process

A comprehensive onboarding and offboarding checklist ensures that employees are granted appropriate access rights when they join and that access is revoked when they leave. If your IT provider does not have a clear process in place, you could be leaving your systems open to potential security risks. Properly managing access rights helps mitigate insider threats and ensures compliance with security policies.


9. All managed devices have anti-virus installed

Having anti-virus software on all managed devices is a fundamental step in safeguarding your organization against malware and other threats. If your IT provider has not ensured that every managed device is equipped with reliable anti-virus software, your organization is exposed to significant risk. Regular updates and scans are also critical to maintaining effective protection.


10. You have good spam filtering

Email is a common attack vector for cybercriminals, particularly through spoofing attempts. If your IT provider does not have an effective spam filtering solution in place that can block or alert users about potential spoofing, you are at a higher risk of falling victim to phishing attacks. A robust spam filter will protect your organization by analyzing incoming emails and flagging suspicious activity.

By evaluating your IT provider against these criteria, you can gain a clearer understanding of whether they are doing enough to protect your organization. If any of these areas are lacking, it may be time to address your concerns or consider finding a more capable partner. Your business’s cybersecurity and operational integrity depend on it.

Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
Could your sheltered workshop benefit from grant funding for new technology?
By Jon Lober April 7, 2025
As a sheltered workshop, you play a crucial role in providing meaningful employment opportunities for individuals with disabilities. However, like any organization, securing funding for technology upgrades can be a challenge. While investing in the right tools can improve efficiency, security, and overall productivity—that’s all only if you can afford the tools in the first place.
best office pranks for April Fools 2025
By Jon Lober March 31, 2025
Need April Fools pranks for your office? This list is technically harmless, but great fun. Happy pranking!
More Articles