The time may come when you find yourself in the position to expand your business through the acquisition of one of your competitors or contemporaries. You may be in this position now. Either way, congratulations! This process can be rewarding and potentially quite profitable, provided everything goes according to plan.
One of the most important aspects to pay attention to during this process is the technology you’ll suddenly be adding to your toolkit. After all, you don’t want to find yourself with a huge, surprise mess.
It is crucial that you thoroughly audit all the IT assets acquired as part of your acquisition to ensure a comprehensive understanding of what you now possess. You don’t want any costs or liabilities to go unnoticed, as these risks could wind up turning an investment into a money pit.
Here are the steps you will want to undergo as you carry out this inspection:
As you acquire a business, you need to check to see how well-maintained its network and all associated components are. Check the age of the servers, workstations, and networking equipment. If the hardware doesn’t need to be replaced outright, ensure that it is properly updated and managed.
Next, check the software that the hardware allows you to access and utilize. Confirm that everything in use is properly licensed, and critically, take a full inventory of all active subscriptions. This will help you identify any redundant or unused subscriptions that should be cancelled while also helping you integrate them into your existing subscription costs.
Crucially, you need to identify the state of your new technology’s security, including all past breaches and current security tools in your considerations. If there have been past breaches, investigate what caused them and confirm that any holes in your acquisition’s security strategy are addressed. Ensure that you also evaluate the preparedness of your new team members to determine if they are up-to-date on security best practices and identify any necessary training.
Use the following checklist to ask the right questions throughout your acquisition:
Hardware (Inventory and Condition)
These questions will help you determine how much you need to invest in addition to your acquisition cost.
Software and Licensing
These questions will help protect you from surprise recurring costs and non-compliance issues.
Security
These questions provide the information you need to determine whether your new acquisition is adequately equipped to address cybersecurity issues.
Data Backup and Recovery
These questions determine the capability of your newly acquired organization to recover from a data loss disaster.
Breach History
These questions can help you uncover past incidents that may have latent consequences for your business after the acquisition is complete.
Ongoing Contracts and Vendor Agreements
This ensures you know who your newly acquired business has relationships with.
You need to know that your business, including the parts you’ve recently added, has the technology it needs to support its operations productively and securely. We can help with that!
Turn to Texas Professional IT Services LLC for assistance in managing your business’ IT, from day-to-day needs to special circumstances. Contact us at (832) 514-6260 to learn more.
About the author
Texas Professional IT Services LLC has been serving the Baytown area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Comments