Track Your Workload

Document, document, document!  Don't skip out on taking a few extra minutes to track & document all of your cases.  You'll be able to reference this information for future problems, help colleagues form solutions and as empirical data to validate your need for extra personnel.  There are hundreds of ticketing solutions out there - pick one and stick with it!

Document Vendors

Make sure that you have a master list of your third party vendors somewhere that is visible and easily accessible.  Make note of the vendors name, contact information & their exact responsibilities as it relates to your company.  Have an Account Manager or specific Point-of-Contact?  You should make note of that also.  Doing this will help you quickly and efficiently get the right vendor involved when something out of your control goes belly up.

Get Endpoint Protection

Yes, you need it.  No, you can't use a free version.  Endpoint is a fancy word for desktops, laptops & servers.  You know - all the things in your company that house super important and business critical data.  Don't rely solely on a firewall or a wish-and-a-hope that you never come under attack or contract a virus.  Research and implement a widely used & respected business endpoint protection suite.  Already have one?  Awesome - make sure you keep it up-to-date!

Simplify Your Network

There is beauty in simplicity.  Keep your network topology & configuration as simple as possible while still achieving your goals.  Keeping things simple will help you identify and resolve network issues faster and more efficiently.  Not a networking pro?  There's no shame in calling in a vendor for a little extra help in planning and implementing a simple network that will serve your needs.

Change Default Credentials

In short…NO.  Change them, preferably before the device every goes "live" and is still being configured to be placed into your network.  Leaving the default credentials on devices is a major contributing factor to weaknesses in networks - that means you're open to digital attacks, and that's no fun for anyone.  It's a simple and quick thing to do - make sure you stick to this rule without exception.

Patch & Update Software

Yes, you actually should be doing this.  It can be troublesome at times, and yes, sometimes things don't go as planned when updating an OS or software.  However, things will be more troublesome by leaving your applications and software open to attack due to non-patching.  Software providers spend a lot of time & money updating their software to keep you safe from attack

Virtualize

If you're not read up on virtualization…get to work!  You can significantly decrease your physical & utility footprint of your infrastructure by implementing virtualized servers.  Not to mention your backup and recovery options become more robust, faster and significantly easier to manage.  This is the direction servers are headed, make sure you take some time to learn about it.  Don't have time?  There are many vendors today that specialize in virtualizing environments - give them a ring.