Most advisors are aware of the technology that requires the most attention in their firms: software, product vendors, processes and best practices. Given this understandable order of things, it often happens that the hardware your firm uses becomes somewhat of an afterthought. Furthermore, if you have an IT firm that manages your infrastructure, often the default is to simply rely on its recommendations. However, you still have to manage the relationship. Regardless of who manages the hardware needs of your firm (or perhaps if no one is really on top of it), here are some areas you want to make sure get regular attention.
Take an inventory of every item in your technology environment. From personal computers to scanners to firewall devices, you should record the specific details of every device owned by your firm. Items to record could include the brand, model and age of the device, as well as how critical it is to your firm: If it failed tomorrow, what would you do? Don’t fall into the trap of thinking you have no technology hardware because you are a “cloud-based” environment. You should still have computers (including portable devices), printers, routers, firewalls, probably a network switch and other hardware to support your cloud-based systems.
After you have taken an inventory of your hardware, establish a replacement cycle for each item. It’s not that every item will ultimately need to be replaced (and the cycle is certainly not the same for each item), but it is important to plan according to each component’s useful life. For example, for certain critical hardware items (firewall, server, etc.), ensuring the item is still covered by a warranty and technology support is a good idea. You need to budget both the time and expense to replace the item or at least extend the warranty when the initial covered period expires. A well-drafted replacement cycle leads to improved reliability for your technology hardware.
When you do replace hardware, it is important that you remove any access credentials or private information on the old device. Too often, this important step is missed and the item is put in storage or worse, donated or sold to a third party with the private information included. Don’t take these unnecessary risks; ensure it is a clean machine (like it was when it was originally purchased) as the last step before it is officially replaced.