0% found this document useful (0 votes)
17 views3 pages

IT - Admin - Report - C

This report outlines the current IT and Administrative operations at Design Ltd., highlighting vulnerabilities such as a recent hacking incident and recommending improvements to Microsoft 365. Key issues include inadequate cybersecurity measures, poor asset tracking, and manual management processes. The report suggests implementing a firewall, migrating to M365, and digitizing administrative tasks to enhance efficiency and security.

Uploaded by

moraha4967
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

IT - Admin - Report - C

This report outlines the current IT and Administrative operations at Design Ltd., highlighting vulnerabilities such as a recent hacking incident and recommending improvements to Microsoft 365. Key issues include inadequate cybersecurity measures, poor asset tracking, and manual management processes. The report suggests implementing a firewall, migrating to M365, and digitizing administrative tasks to enhance efficiency and security.

Uploaded by

moraha4967
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

IT & Admi

**Prepared by**: [Your Name]

**Department**: IT & Administration

**Company**: Design Ltd.

**Date**: April 10, 2025

📌 Purpose of the Report


This report provides an overview of current IT and Administrative operations, identifies
existing resources, highlights vulnerabilities (including a recent hacking incident), and
recommends key improveme to Microsoft 365 (M365).

🔧 Current Overview

IT Department Responsibilities
- Daily tech support for all users.

- Maintenance of computers, printers, internet.

- Managing emails and user accounts.

- Manual backups of local server.

- Basic antivirus and local file sharing.

- Handling software installations and licenses.

🧾 Admin Department Responsibilities


- Office supplies, vendor coordination.

- Maintenance and cleanliness of office.

- Visitor and courier management.

- Support for staff onboarding/offboarding.

- Basic documentation in Excel format.


Assets Overview

IT Assets
- Computers, printers, routers: [Insert quantity]

- Local server: [Insert specs if known]

- ISP connection: [Speed and provider]

- Software licenses: [e.g., Adobe, MS Office]

- Antivirus coverage: [Yes/No, How many]

Admin Assets
- Vendor contacts (scattered, manual)

- Office supplies inventory (tracked in Excel)

- Maintenance tools and checklists

⚠️Key Issues Identified

🔐 IT Gaps
- No firewall or proper cybersecurity setup.

- Weak or no backup system.

- Unmanaged local email setup with phishing risk.

- No asset tracking system.

- Network drops and unreliable internet.

📉 Admin Gaps
- Manual vendor and supply management.

- No central database or digital tracking.

- Unoptimized space usage and poor record-keeping.

💡 Why Microsoft 365 Now


After a server hacking incident, the need for secure and modern digital tools became urgent.
M365 helps with:
- Secure file sharing (OneDrive/SharePoint)
- Professional email with admin controls (Outlook)
- Improved communication and collaboration (Teams)
- Regular cloud backup and user access control (Azure AD)

🚀 Recommended Improvements

IT
- Install firewall and endpoint protection.

- Fully migrate to Microsoft 365.

- Create a digital IT asset register.

- Upgrade routers and ensure reliable network access.

- Train employees on cybersecurity best practices.

🧹 Admin
- Create a centralized vendor database.

- Shift supply tracking to shared cloud sheets.

- Digitize maintenance and office logs.

- Reorganize office space and storage.

- Establish a small admin task automation system.

✅ Next Steps
- Finish M365 rollout with proper user training.

- Start IT asset inventory and documentation.

- Set policies for cybersecurity and software use.

- Digitize admin processes for better control and transparency.

- Schedule periodic reviews and audits for both departments.

You might also like