Updated April 2026 · Written by Andy Pickett, CTO at Connection Technologies

When was the last time someone looked under the bonnet of your business IT? If the answer is “never” or “I cannot remember,” you are not alone. Most UK SMEs only discover their IT vulnerabilities when something goes wrong — a ransomware attack, a catastrophic server failure, or a compliance audit that reveals critical gaps.
An IT health check gives you a clear, honest picture of where your technology stands today, what risks you are exposed to, and what needs to change. This guide walks you through what a professional IT audit covers, provides a free 20-point checklist you can use to self-assess your own systems, and explains what to do with the results.
What Does an IT Health Check Cover?
A thorough IT health check examines every layer of your technology stack. Professional IT audits in the UK typically cover the following areas:
| Audit Area | What’s Assessed | Why It Matters |
|---|---|---|
| Network infrastructure | Routers, switches, firewalls, Wi-Fi, cabling, VLAN segmentation | Network issues cause 40% of all business IT downtime |
| Cybersecurity posture | Firewall rules, endpoint protection, email filtering, MFA, access controls | UK businesses face an average of 10 cyber attacks per day in 2026 |
| Cloud and Microsoft 365 | Licence utilisation, security configuration, conditional access, backup | Misconfigured Microsoft 365 is the single most common vulnerability we find |
| Backup and disaster recovery | Backup schedules, retention, offsite copies, recovery testing | 60% of UK SMEs that lose their data close within 6 months |
| Hardware and lifecycle | Device ages, warranty status, performance, end-of-life planning | Aging hardware increases failure risk and support costs dramatically |
| Software and licensing | Installed software, licence compliance, unsupported versions | Running unsupported software (e.g., Windows 10 after October 2025) creates critical security vulnerabilities |
| Compliance and governance | GDPR readiness, Cyber Essentials alignment, industry-specific requirements | Non-compliance penalties can reach £17.5 million or 4% of global turnover for GDPR |
| User practices and training | Password policies, phishing awareness, shadow IT, remote working security | Human error is involved in 82% of data breaches |
Free IT Health Check: 20-Point Self-Assessment Checklist
Before engaging a professional auditor, use this checklist to identify the most obvious vulnerabilities in your business IT. Score each item as Green (fully in place), Amber (partially in place), or Red (not in place or not sure). Any item scored Red represents a potential risk that should be addressed as a priority.
Security (Items 1–7)
- Multi-factor authentication (MFA) — is MFA enabled on all user accounts for email, cloud applications, and VPN access? This is the single most effective security measure you can implement and should be considered non-negotiable in 2026.
- Endpoint protection — do all computers and laptops have business-grade antivirus and endpoint detection and response (EDR) software installed and actively monitored? Consumer-grade antivirus is insufficient for business use.
- Email filtering — do you have advanced email filtering that blocks phishing emails, malicious attachments, and spoofed sender addresses before they reach user inboxes?
- Firewall configuration — is your firewall a business-grade appliance (not a consumer router) with up-to-date firmware, properly configured rules, and intrusion detection/prevention enabled?
- Password policy — do you enforce strong password requirements (minimum 12 characters, complexity rules) and prevent password reuse across systems?
- Admin access controls — are admin privileges restricted to IT staff only? Standard users should not have local admin rights on their workstations.
- Security awareness training — have all staff completed cybersecurity awareness training in the last 12 months, including simulated phishing exercises?
Backup and Recovery (Items 8–11)
- Automated backups — are all critical data, email, and systems backed up automatically on a daily basis or more frequently?
- Offsite/cloud backup — do you have at least one backup copy stored offsite or in the cloud, physically separated from your primary data?
- Backup testing — have you tested restoring data from backup in the last 6 months? Backups that have never been tested are not backups — they are hopes.
- Disaster recovery plan — do you have a documented plan for recovering your IT systems after a major incident (fire, flood, ransomware)? Do key staff know what to do?
Infrastructure and Performance (Items 12–16)
- Hardware age audit — are any of your computers, servers, or network equipment more than 5 years old? Aging hardware is more likely to fail and often cannot run current security updates.
- Software updates — are all operating systems and applications running supported, current versions with the latest security patches applied?
- Internet connectivity — do you have business-grade broadband with an SLA, and do you have a backup connection or 4G/5G failover in case your primary line goes down?
- Wi-Fi security — is your Wi-Fi network using WPA3 (or at minimum WPA2-Enterprise) encryption, with separate guest and corporate networks?
- Server monitoring — if you run on-premise servers, are they monitored 24/7 for performance, capacity, and hardware health?
Compliance and Governance (Items 17–20)
- GDPR compliance — do you have a documented data protection policy, a record of processing activities, and a clear process for handling data subject access requests?
- Cyber Essentials — have you achieved Cyber Essentials or Cyber Essentials Plus certification? This is increasingly required by insurers, government contracts, and supply chain partners.
- IT documentation — is your IT environment fully documented, including network diagrams, asset registers, admin credentials (stored securely), and support contact details?
- IT spending review — have you reviewed your IT spending in the last 12 months to identify waste, unnecessary licences, or opportunities to consolidate services?
Common Vulnerabilities Found in UK Business IT Audits
Having conducted hundreds of IT health checks for UK businesses, the Connection Technologies team consistently finds the same recurring issues. Here are the most common vulnerabilities ranked by how frequently we encounter them:
| Vulnerability | How Often We Find It | Risk Level | Typical Fix |
|---|---|---|---|
| MFA not enabled on all accounts | 72% of businesses | Critical | Enable MFA on Microsoft 365, VPN, and all cloud apps — takes 1–2 hours |
| No tested backup restore process | 65% of businesses | Critical | Schedule quarterly backup restore tests |
| Outdated firmware on firewalls/switches | 61% of businesses | High | Update firmware and enable auto-update where available |
| Local admin rights on user workstations | 58% of businesses | High | Remove admin rights, implement a privileged access management solution |
| No cybersecurity awareness training | 55% of businesses | High | Implement annual training with quarterly phishing simulations |
| End-of-life hardware still in production | 48% of businesses | High | Plan a hardware refresh cycle, budget for replacements |
| Microsoft 365 misconfiguration | 45% of businesses | High | Review conditional access, DLP, and sharing policies |
| No documented disaster recovery plan | 42% of businesses | High | Create and test a DR plan covering all critical systems |
What Happens After an IT Health Check?
A professional IT health check delivers a detailed report that prioritises findings by risk level and provides actionable recommendations. Here is what you can expect from a Connection Technologies IT audit:
- Executive summary — a one-page overview suitable for business owners and directors, highlighting the top risks and recommended actions.
- Detailed findings — a comprehensive breakdown of every area assessed, with each item scored by risk level (critical, high, medium, low) and current status.
- Prioritised remediation plan — a roadmap of recommended changes ordered by risk priority and estimated cost, so you can address the most critical issues first.
- Budget estimate — indicative costs for recommended improvements, allowing you to plan and budget effectively.
- Follow-up review — typically 3–6 months after the initial audit to verify that critical items have been addressed and reassess the overall risk posture.
The goal is not to sell you services — it is to give you a clear, unbiased picture of where you stand. Many of the items identified in an IT health check can be resolved by your own IT team or your existing provider. Where specialist help is needed, we provide transparent pricing and no obligation to engage Connection Technologies for the remediation work.
How Much Does a Professional IT Audit Cost?
Professional IT health check pricing in the UK varies based on business size and complexity:
| Business Size | Users | Typical Audit Cost | What’s Included |
|---|---|---|---|
| Micro business | 1–10 | £500–£800 | Network scan, security review, cloud configuration check, summary report |
| Small business | 10–25 | £800–£1,500 | Full infrastructure audit, security assessment, compliance review, detailed report with remediation plan |
| Medium business | 25–50 | £1,500–£2,500 | Comprehensive audit including penetration testing, policy review, staff interviews, executive presentation |
| Mid-market | 50–100+ | £2,500–£5,000+ | Enterprise-grade assessment, compliance framework mapping, risk register, board-level reporting |
Connection Technologies offers a free initial IT health check for UK businesses. This covers the key areas of security, backup, and infrastructure and provides a summary of the most critical findings. It is a no-obligation assessment designed to give you confidence in your IT setup or highlight areas that need attention.
When Should You Get an IT Health Check?
We recommend that every UK business conducts a formal IT health check at least once a year. However, there are specific triggers that warrant an immediate assessment. If you have recently experienced a cyber incident or near-miss, you should assess what failed and fix it before a repeat attack. If you are changing IT provider, an independent audit ensures you understand exactly what you are inheriting. Before a compliance audit for Cyber Essentials, ISO 27001, or sector-specific regulations, an IT health check identifies gaps before the assessor does. If you have experienced significant business growth by adding more than 20% users or opening new locations, your IT infrastructure may not have scaled to match. After a major IT change such as a cloud migration, office move, or infrastructure upgrade, you should verify everything is configured correctly and securely.
Book Your Free IT Health Check
Connection Technologies offers free IT health checks for UK businesses. Our engineers will assess your security, infrastructure, and compliance posture and provide a clear report with prioritised recommendations. No obligation, no sales pressure.
Or call us on 0333 015 2615
Frequently Asked Questions
What is an IT health check?
An IT health check is a comprehensive assessment of your business technology covering network infrastructure, cybersecurity, backup and disaster recovery, cloud configuration, hardware lifecycle, software licensing, compliance, and user practices. It identifies vulnerabilities, inefficiencies, and risks, and provides prioritised recommendations for improvement.
How much does an IT audit cost for a small business?
A professional IT audit for a small UK business with 10–25 users typically costs between £800 and £1,500. This includes a full infrastructure assessment, security review, compliance check, and a detailed report with a prioritised remediation plan. Connection Technologies offers a free initial IT health check covering the key risk areas.
How often should a business have an IT health check?
At minimum, once a year. More frequent assessments are recommended after significant business changes (growth, office moves, cloud migrations), before compliance audits, or following a cyber incident. Many businesses include quarterly security reviews as part of their managed IT support contract.
Can I do an IT health check myself?
You can use our 20-point self-assessment checklist above to identify the most obvious vulnerabilities. However, a professional IT audit provides significantly deeper analysis including network scanning, penetration testing, configuration review, and expert interpretation of the findings. Self-assessment is a good starting point, but it is not a substitute for professional assessment.
Related IT Guides
Related Reading
More from the Connection Technologies blog.
