Spring is a welcome time of year. Temperatures start to warm up, we have longer days, and lots of plants and flowers transition out of their dormant state. For advisors, spring also brings Tax Day (April 18 this year), after which they should have more time for other tasks and items.
This is also the time of year when “spring cleaning” occurs, whether it is for your home or business. You can apply the same mindset to your technology — and it is often well overdue.
A good place to start spring cleaning for your technology is the data that is stored by your firm, especially data that is readily accessible on servers and cloud applications. Types of data to review include personally identifiable information in old presentations and documents, and even in raw data files downloaded from your custodian or other companies. Do you really need all this information to be available on demand?
You might be surprised by the amount of data you are storing and don’t need anymore. And if you are not storing and protecting the old data properly, i.e., using encryption software, you are taking unnecessary risks in the event of a data breach or security compromise.
You should follow the same process for removing outdated software programs. This could be a significant benefit for your staff members, especially if they complain that their computers are too slow. Review the programs that are part of the “start-up” process when they first log on to their computers. It is not uncommon for programs that you installed long ago to be included in the start-up process even though you haven’t recently used the software. This could include products like GoToMeeting, Skype, Dropbox and other connectivity programs. This is also a good time to review the full list of programs or apps installed on your computer and uninstall anything that is no longer used.
Your technology spring cleaning should also include re-evaluating any “one off” technology solutions used by your firm (meaning not widely used or worse, not even understood how they are used). This review should include any programs that are no longer supported or maintained under a technology support agreement. Perhaps you had custom development work done years ago that is still used today, or maybe you built extensive macros using Excel or other programs when you couldn’t find an “off the shelf” solution. These may not be bad programs, but you want to make sure you understand how they are being used. More importantly, you need to know the potential business risk if they unexpectedly stop working. What would you do at that point? Better to know this answer now and have a response plan identified.
What About Old Hardware?
Do you have old computers around the office, maybe even an old server or two? Perhaps you keep these devices to run old programs that you need only rarely, or for some other “just in case” situation, which isn’t necessarily a bad idea. However, at a minimum, make sure these are “clean” devices that no longer have critical data or access credentials stored on them.