On Point Legal Tech's general assessment includes your firm's infrastructure, network/wifi/internet, servers/workstations, telephony, printers and software. We can also provide more targeted evaluation of suspected security and performance issues at your request.
- Start by filling out our evaluation request form.
- Our team will review your request, calculate the cost, and contact you to schedule the evaluation.
- We will prepare a detailed report and offer consultation on your options moving forward.
IT Evaluation details:
- External Network Connections – On Point Legal Tech will monitor Internet/VPN Office access and develop baseline bandwidth requirements, make recommendations and check router and firewall security settings.
- Internal Network – Our techs will create an inventory of all connected devices for review, then check device software and firmware for security issues. We will also:
- Develop network traffic baseline use and requirements
- Check WiFi access points for security settings and software updates
- Check WiFi for interference from other WiFi or radio frequency devices
- Check user authentication methods and verify that user lists are current
- Workstations – We will create an inventory of each workstation and its software, and we will assign security scores for each one based on updates.
- Servers – We will create an inventory of each server and its software, and we will assign security scores for each one based on updates. We will also include info on psuedo-servers (e.g., QuickBooks, security systems, activity tracking systems, etc.)
- Printer and Scanners
- Mobile Phones/Tablets – If your firm provides mobile phones, we can check the phones to make sure all firm data stored on the device meets firm security requirements and is deletable in case of loss or separation.
Security and Performance evaluations
Do you feel there may be security holes in your network? Do you think certain devices or network connections should be performing better? We can collaborate with you on specific parts of the evaluation to address suspected or known issues involving security or performance.
Our final report will include recommendations for improvement and a plan for implementation.