Keeping your network safe and secure requires extreme attention to detail on the part of your IT support provider. 

Network security boils down to a very high number of small, but mission-critical, processes and procedures which must be executed consistently. Overlooking a single step – such as failing to create on off-site data backup – can compromise all of the work that’s been done to keep your network secure.  

That’s why, as we’ve grown Proactive IT over the past decade, we’ve done it with a major focus on processes, procedures, and systems to ensure that our team is executing every step that we’re supposed to be executing – and that if somebody misses a step, our management team knows about it and can quickly fix the situation. 

That level of attention to detail is the only way to ensure that the businesses we serve are fully protected at all times. Our leadership team has spent hundreds and hundreds of hours over the past decade learning, researching, planning, and adjusting to ensure that we’ve covered every detail to keep our clients’ networks secure.  

 As an example, when it comes to backup systems, we know that simply installing backup software isn’t adequate. That’s why we follow the “3-2-1-1-0” principle. Here’s what that process looks like:  

  • We make three copies of your data so that even if one is somehow lost or compromised, there are other copies stored in different locations.  
  • We use two different forms of media to store your data, so that if one is somehow destroyed, the data is secured through another format.  
  • We store at least one (actually two in our case) of your data back-ups at an off-site location, which protects your business from threats like theft, fire, vandalism, or other physical disasters.  
  • We store at least one of your data back-ups completely offline, or “air-gapped,” which means that it’s nearly impossible for a cybercriminal to get access. (This is a REALLY important cybersecurity best practice. Ask your IT company if they’re doing this – because if they’re not, you’re vulnerable to cyberattack.)  
  • We constantly test and monitor backup systems to ensure zero errors.  

That’s the level of attention to detail that we apply to every component of network security – because that’s what it takes to keep our clients safe and secure. 

 Is your IT provider committed to getting the details right, every single time? The next time you have a conversation with them, take a moment to ask them how the work is getting done… and ask them whether they have systems in place to ensure that if the work isn’t getting done, they’re going to know about it so that they can fix it before it’s too late.  

 If your IT provider doesn’t have systems, processes, procedures, and checklists in place for every aspect of the service they provide – there’s a good chance that they’re making mistakes. And that means that YOUR business is vulnerable. 

 Effective IT companies have to be obsessed with the details. There’s no other way to get this done.  

 Does your IT provider sweat the details?  

 If you’d like to have a conversation about your business IT strategy, we’re here to help. Please reach out to us via email at or 704-464-3075 extension 3.         

 Dedicated to IT security and productivity,     

 – Steve   

Steve Kennen, president of Proactive IT and cybersecurity expert

About Steve Kennen

As an expert in information technology infrastructure management, cybersecurity, and cyber risk management practices for small businesses, Steve spearheads initiatives that keep his clients secure and their business operations running smoothly. His core message is that the details matter.