Helpdesk and incident reporting auditing

Last updated

Help desk and incident reporting auditing is an examination of the controls within the help desk operations. The audit process collects and evaluates evidence of an organization's help desk and incident reporting practices, and operations. The audit ensures that all problems reported by users have been adequately documented and that controls exist so that only authorized staff can archive the users’ entries. It also determine if there are sufficient controls to escalate issues according to priority.

Contents

Types of help desks

The management and support of IT assets is essential for all businesses. Help desks are now fundamental and key aspects of good business service and operation. Through the help desk, problems are reported, managed and then appropriately resolved in a timely manner. Help desks can provide both internal and external users the ability to ask questions and receive effective answers. Moreover, help desks can help the organization run smoothly and improve the quality of the support it offers to the users.

Help desk auditing

Objectives

Auditing procedure

  1. Does management calculate how many problems are reported per month?
  2. How many problems are resolved per month by individual help desk staff members?
  3. Does management compare the number of problems reported per day with the number of problems resolved per day?
For the last question, tracking systems will help to identify whether the help desk has adequate staff to deal with the number of issues received at any given time. Furthermore, the problems distribution should be monitored to ensure that the staff is appropriately scheduled in to meet customer demand.

Software

Today, there are many software choices which help management operate the help desk functions. In addition, these software products greatly improve the auditing of help desk operation. Help desk software is management software that automates many features of an organization's help desk environment, such as automated email response. It gives businesses the capability of using a systematic approach to responding to both internal and external users.

The typical functionality of help desk software includes:

The core components of any help desk software application include the abilities to record and track support requests through all stages. In addition, reporting is also a key element to providing detailed information on how the system is running. The right choice of help desk software depends on the size of the organization and the complexity of the support process. The business needs will vary greatly during different periods of time.

Help desk software common functions

Outsourcing

The outsourcing of the help desk function and IT operations as a whole are a growing trend. However, it is important for the management to be aware of the ultimate responsibility for the help desk. This responsibility is still retained in the organization and not in the outsourcing firms. Help desk is still substantially important even if it is outsourced. In addition, it is critical to have appropriate management structure. Outsourcing decisions always involved both risks and benefits. The risks can be mitigated through careful planning. Whether it is a right decision or not for the organization to outsource can be decided through research. It also helps in delegating responsibilities to one and each.

Summary

Help desks play a key role in modern business organizations. A well designed and maintained help desk can substantially:

Effective auditing practices can contribute to maintaining the high quality of help desks, and help desk software may further improve the efficiency of help desk auditing.

See also

Related Research Articles

<span class="mw-page-title-main">Audit</span> Systematic and independent examination of books, accounts, documents and vouchers of an organization

An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon.” Auditing also attempts to ensure that the books of accounts are properly maintained by the concern as required by law. Auditors consider the propositions before them, obtain evidence, and evaluate the propositions in their auditing report.

<span class="mw-page-title-main">Systems development life cycle</span> Systems engineering term

In systems engineering, information systems and software engineering, the systems development life cycle (SDLC), also referred to as the application development life-cycle, is a process for planning, creating, testing, and deploying an information system. The systems development life cycle concept applies to a range of hardware and software configurations, as a system can be composed of hardware only, software only, or a combination of both. There are usually six stages in this cycle: requirement analysis, design, development and testing, implementation, documentation, and evaluation.

Technical support is a call centre type customer service provided by companies to advise and assist registered users with issues concerning their technical products. Traditionally done on the phone, technical support can now be conducted online or through chat. At present, most large and mid-size companies have outsourced their tech support operations. Many companies provide discussion boards for users of their products to interact; such forums allow companies to reduce their support costs without losing the benefit of customer feedback.

A service-level agreement (SLA) is a commitment between a service provider and a client. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user. The most common component of an SLA is that the services should be provided to the customer as agreed upon in the contract. As an example, Internet service providers and telcos will commonly include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. In this case, the SLA will typically have a technical definition of mean time between failures (MTBF), mean time to repair or mean time to recovery (MTTR); identifying which party is responsible for reporting faults or paying fees; responsibility for various data rates; throughput; jitter; or similar measurable details.

Business software is any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, measure productivity, and perform other business functions accurately.

Information technology service management (ITSM) is the activities that are performed by an organization to design, build, deliver, operate and control information technology (IT) services offered to customers.

An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure and business applications. The evaluation of evidence obtained determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.

A mainframe audit is a comprehensive inspection of computer processes, security, and procedures,with recommendations for improvement.

In business and accounting, information technology controls are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise's internal control. IT control objectives relate to the confidentiality, integrity, and availability of data and the overall management of the IT function of the business enterprise. IT controls are often described in two categories: IT general controls (ITGC) and IT application controls. ITGC include controls over the Information Technology (IT) environment, computer operations, access to programs and data, program development and program changes. IT application controls refer to transaction processing controls, sometimes called "input-processing-output" controls. Information technology controls have been given increased prominence in corporations listed in the United States by the Sarbanes-Oxley Act. The COBIT Framework is a widely used framework promulgated by the IT Governance Institute, which defines a variety of ITGC and application control objectives and recommended evaluation approaches. IT departments in organizations are often led by a chief information officer (CIO), who is responsible for ensuring effective information technology controls are utilized.

An information security audit is an audit on the level of information security in an organization. It is an independent review and examination of system records, activities and related documents. These audits are intended to improve the level of information security, avoid improper information security designs, and optimize the efficiency of the security safeguards and security processes. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to auditing the logical security of databases, and highlights key components to look for and different methods for auditing these areas.

An issue tracking system is a computer software package that manages and maintains lists of issues. Issue tracking systems are generally used in collaborative settings, especially in large or distributed collaborations, but can also be employed by individuals as part of a time management or personal productivity regimen. These systems often encompass resource allocation, time accounting, priority management, and oversight workflow in addition to implementing a centralized issue registry.

<span class="mw-page-title-main">Internal audit</span> Independent, objective assurance and consulting activity

Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps an organization to accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance processes. Internal auditing might achieve this goal by providing insight and recommendations based on analyses and assessments of data and business processes. With commitment to integrity and accountability, internal auditing provides value to governing bodies and senior management as an objective source of independent advice. Professionals called internal auditors are employed by organizations to perform the internal auditing activity.

Project workforce management is the practice of combining the coordination of all logistic elements of a project through a single software application. This includes planning and tracking of schedules and mileposts, cost and revenue, resource allocation, as well as overall management of these project elements. Efficiency is improved by eliminating manual processes, like spreadsheet tracking to monitor project progress. It also allows for at-a-glance status updates and ideally integrates with existing legacy applications in order to unify ongoing projects, enterprise resource planning (ERP) and broader organizational goals. There are a lot of logistic elements in a project. Different team members are responsible for managing each element and often, the organisation may have a mechanism to manage some logistic areas as well.

Internal control, as defined by accounting and auditing, is a process for assuring of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. A broad concept, internal control involves everything that controls risks to an organization.

In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions.

A virtual help desk allows IT support organizations to virtually deploy IT technicians on demand to support a computer user experiencing technical issues. IT can efficiently manage and allocate global help desk resources, including – most importantly – its personnel, to access any computer to provide support despite the end user or IT rep location. Virtual help desks allow IT reps to virtually access end systems through support sessions where they can diagnose and fix computer issues quickly. This eliminates in-person customer service calls and/or ineffective phone-only tech support sessions, making the help desk more efficient.

By definition an audit is,

Help desk software is a computer program that enables customer-care operators to keep track of user requests and deal with other customer-care-related issues. It is what makes customer-care service efficient and enterprising.

Data center management is the collection of tasks performed by those responsible for managing ongoing operation of a data center This includes Business service management and planning for the future.

In IT operations context, software performance management is the subset of tools and processes in IT Operations which deals with the collection, monitoring, and analysis of performance metrics. These metrics can indicate to IT staff whether a system component is up and running (available), or that the component is behaving in an abnormal way that would impact its ability to function correctly—much like how a doctor may measure pulse, respiration, and temperature to measure how the human body is "operating". This type of monitoring originated with computer network components, but has now expanded into monitoring other components such as servers and storage devices, as well as groups of components organized to deliver specific services and Business Service Management).