Library
Hardware & Infrastructure

4. IT & Data Management

(The "If Tech Fails, You Fail" List)

4.1 Hardware & Infrastructure

(Or: "How to keep your office from turning into a tech graveyard.")

________________________________________

4.1.1 Laptops/Desktops

The Lifeline of Your Business

💡 Smart Purchasing Guide

Need Recommendation Budget (₹) Why It Matters

Founders/Devs MacBook Pro/Dell XPS 1.5-2.5L Security + longevity

Sales/Operations ThinkPad/HP Elite 50-80K Durability for travel

Interns/Temp Staff Refurbished ThinkPads 20-35K Cheap but functional

🔥 Horror Story:

A Mumbai startup bought 10 cheap "gaming laptops" for ₹45K each. Within 8 months:

• 7 had keyboard failures

• 3 motherboards fried

• Total loss: ₹6.3L (would've been cheaper to buy premium)

Maintenance Protocol:

✅ Bi-annual cleaning (dust kills performance)

✅ Battery replacement every 2 years

✅ Encryption mandatory (BitLocker/FileVault)

________________________________________

4.1.2 Printers & Scanners

The Office Divas

Buy vs Lease Decision Matrix

Factor Buy (₹15-50K) Lease (₹1.5-5K/month)

Best For Long-term use Frequent upgrades

Maintenance Your headache Vendor's problem

Tax Benefit Depreciation Full expense deduction

Pro Tip:

• Always get AMCs - Printer repairs cost ₹3-8K per incident

• Network printers > USB printers (enables secure printing)

💀 Nightmare Scenario:

An accountant left tax returns in the printer tray overnight. The office cleaner sold them to a competitor.

________________________________________

4.1.3 Wi-Fi & Networking

Your Digital Front Door

Security Must-Dos

1. Change default passwords (Most hacks exploit this)

2. Separate networks:

o Staff WiFi (Password changed quarterly)

o Guest WiFi (No internal access)

o IoT VLAN (For smart devices)

3. Firewall Rules: Block torrents/RDP ports

Access Control Levels:

Role Access Device Limit

Founders Full network + VPN 5 devices

Employees Business apps only 2 devices

Visitors Internet-only (throttled) 1 device

🔥 Bloodbath Case:

A Delhi startup used "password123" for their WiFi. Hackers:

• Stole client proposals

• Installed ransomware

• Demanded 2 Bitcoin to unlock files

________________________________________

🛡️ IT Health Check

"How vulnerable are you?"

Component 😱 Time Bomb 🛠️ Basic 🛡️ Fort Knox

Devices 7-year-old laggards Standard issue Encrypted SSDs + theft tags

Printers USB-only dinosaurs Networked + AMC Secure print release

Network Open WiFi Basic password Enterprise firewall

________________________________________

🚨 IT Emergency Response

"When tech goes rogue:"

Disaster First Aid Surgery

Ransomware Attack Disconnect from network Restore from offline backups

Printer Meltdown Buy time at nearby cyber café Negotiate 4-hour SLA in AMC

Wi-Fi Hack Change all passwords Implement MAC address filtering

________________________________________

📌 Founder's IT Survival Kit

1. The 3-2-1 Backup Rule

o 3 copies (Live + Local backup + Cloud)

o 2 different mediums (HDD + NAS)

o 1 offsite (AWS/GDrive)

2. The Password Vault

o Use Bitwarden/1Password (Never reuse passwords)

3. The Tech Will

o Document all:

 Admin passwords

 Vendor contacts

 License keys

________________________________________

🎯 Final Thought

"Your IT infrastructure is like your immune system - you only notice it when it fails, and by then it's already a crisis."