Most Sydney businesses only question their IT provider after something goes wrong — a server outage during end-of-month processing, a ransomware attack that slipped through, or a bill that keeps climbing with no clear explanation of what it covers. By that point, the damage is already done. The smarter move is to evaluate your IT provider before you’re in crisis mode. This checklist gives you a structured, honest way to do exactly that — no technical expertise required.
Why the Standard ‘Is the IT Working?’ Test Is Not Enough
A lot of businesses measure their IT provider by a single question: are the systems up? If staff can log in and emails are flowing, things seem fine. But that standard misses everything that determines whether your business is genuinely protected and well-positioned for growth. Managed IT support is not just about keeping the lights on — it’s about documentation, security posture, lifecycle planning, and whether your provider is making decisions that serve your business or just their billing model.
Consider this: under Australia’s Privacy Act 1988 and the Notifiable Data Breaches (NDB) scheme, your business can be legally obligated to report certain data breaches to the Office of the Australian Information Commissioner (OAIC) within 30 days. If your IT provider has never discussed this with you, never reviewed your data handling practices, and has no documented incident response plan — that is a serious gap. A working network does not mean a compliant or secure one.
The Core Checklist: Six Areas That Reveal the Truth
When you use this evaluate IT provider checklist for your Sydney business, work through each category methodically. Score your provider honestly — not based on how pleasant the relationship feels, but on documented evidence and measurable outcomes.
1. Documentation and environment visibility. Can your provider hand you a full, current network diagram, an asset register, and a list of every third-party software licence your business holds? Good providers document everything as a matter of course — not because you asked, but because structured environments are easier to support, audit, and hand over. If your provider cannot produce this within 24 hours, that is a red flag. 2. Security fundamentals. Are multifactor authentication (MFA), endpoint detection and response (EDR), patching schedules, and email security controls (like DMARC/DKIM/SPF) all in place and documented? Ask for written confirmation, not a verbal yes. 3. Backup and recovery testing. Backups that are never tested are little more than a comfort blanket. Ask your provider how often restore tests are performed, what the documented recovery time objective (RTO) and recovery point objective (RPO) are, and whether off-site or cloud-based copies are held separately from your primary systems. 4. Proactive communication. Does your provider send you monthly or quarterly reports covering system health, security incidents, and upcoming end-of-life hardware? Proactive reporting is a basic expectation, not a premium add-on. 5. Strategic planning. Has your provider sat down with you in the past 12 months to discuss IT budgeting, hardware refresh cycles, and where your technology roadmap is heading? Reactive support keeps things running; strategic planning keeps your business competitive. 6. Contractual clarity. Do you have a clear, written service agreement that specifies response times, escalation paths, and exactly what is and is not included? Ambiguity in contracts almost always benefits the provider, not the client.
Red Flags That Sydney Businesses Often Overlook
Some warning signs are obvious — repeated outages, slow response times, unanswered tickets. But others are subtle and worth knowing. Watch out for providers who resist giving you access to your own systems, your own licences, or your own data. A legitimate managed IT provider should always make it easy for you to leave — not because they want you to, but because confidence in their own service means they don’t need to create lock-in through obscurity.
Another overlooked red flag is scope creep disguised as helpfulness. If your provider regularly bills for work that feels like it should be standard, or if your invoices include line items you don’t fully understand, ask for a written explanation. Reputable providers can and should explain every charge. In a market like Sydney, where IT providers range from solo operators to well-resourced firms, it pays to know whether the person answering your support calls is the same person responsible for your security architecture — or whether there’s a structured team behind your account.
What Good Actually Looks Like: Specific Benchmarks to Apply
Knowing what to look for is more useful than a vague sense that something feels off. Here are concrete benchmarks worth applying when you evaluate IT provider performance for your Sydney business. Response time for critical (P1) issues — total system outage, security breach — should be under 1 hour, ideally with 24/7 coverage or a clearly documented after-hours escalation path. For high-priority (P2) issues — major functionality impaired — 4 hours is a reasonable maximum during business hours. For standard requests, next business day is acceptable, but anything beyond 48 hours for routine issues suggests an understaffed operation.
On the security side, patching cadence matters. Critical operating system and application patches should be deployed within 14 days of release as a general rule, with zero-day vulnerabilities addressed as an emergency. If your provider cannot tell you their patching policy in writing, that is a gap. For backup, the minimum acceptable standard for most Sydney SMEs is daily incremental backups with a weekly full backup, retention of at least 30 days, and a documented restore test at least once per quarter. Anything less than this leaves you exposed in ways that a single ransomware event or accidental deletion can make painfully real.
How to Have the Conversation With Your Current Provider
Once you’ve worked through your evaluate IT provider checklist, you’ll likely have a list of questions or gaps. The next step is a direct conversation — and the way your provider responds tells you almost as much as the answers themselves. A confident, accountable provider will welcome the review. They’ll have documentation ready, will acknowledge any gaps honestly, and will offer a clear plan to address them. A provider who becomes defensive, deflects questions, or gives vague assurances without evidence is showing you something important.
Frame the conversation as a review, not an accusation. Ask for a written summary of your current environment, the security controls in place, and the service levels you’re contracted to receive. If your provider cannot produce this, ask why — and set a reasonable deadline (two weeks is fair) for them to do so. If they still can’t, you have your answer. This is also a good moment to check whether your provider has ever discussed cybersecurity and risk management with you in any structured way, or whether security has been treated as an afterthought.
Making the Decision: Stay, Improve, or Switch
After completing your evaluation, you’ll sit in one of three positions. First: your provider scores well across the board, with minor gaps that can be addressed through honest conversation. That’s a good outcome — continue the relationship and put the improvements in writing. Second: there are significant gaps in documentation, security, or strategic input, but your provider is responsive and willing to address them with a clear plan and timeline. That’s worth working through before making any decisions. Third: the gaps are fundamental — no documentation, reactive-only support, security basics missing, no strategic input — and your provider shows little interest in changing. That’s when switching becomes the responsible choice, not just a preference.
Switching providers does carry short-term friction. A thorough handover should take four to eight weeks for a business of 20–100 staff, and you should budget for some overlap cost during that transition. But the long-term cost of staying with a provider who cannot meet basic standards — measured in downtime, data risk, and compliance exposure — almost always exceeds the cost of moving. For businesses that rely on cloud infrastructure, it’s also worth reviewing your Microsoft 365 and cloud services setup as part of any provider transition, since misconfigured tenants are one of the most common sources of security incidents in Sydney’s SME market.
Frequently Asked Questions
How much should a Sydney business expect to pay for managed IT support?
Pricing varies depending on the size of the environment, the complexity of your infrastructure, and the scope of services included. As a general estimate, Sydney SMEs typically pay between $80 and $180 per user per month for fully managed IT support that includes helpdesk, monitoring, patching, and basic security controls. Providers at the lower end of that range often exclude security tools, strategic planning, or after-hours support — so it’s important to compare scope, not just price. Always ask for a detailed service schedule alongside any quote so you know exactly what is and isn’t covered.
What is the difference between managed IT support and break-fix IT support?
Break-fix support means you call someone when something stops working, and you pay for that specific job. Managed IT support means a provider takes ongoing responsibility for your environment — monitoring systems, applying patches, managing security, and planning ahead — usually for a fixed monthly fee. For most Sydney businesses that rely on technology to operate day-to-day, break-fix is a false economy: it defers costs until a crisis hits, at which point the bill (and the downtime) is far higher than consistent managed support would have been. Managed support also creates accountability — you have a provider who is financially motivated to prevent problems, not profit from them.
How do I know if my IT provider is handling security properly?
Ask for written documentation of the security controls in place across your environment. At a minimum, you should be able to confirm that MFA is enforced on all accounts, endpoint protection is deployed and monitored, email authentication records (DMARC, DKIM, SPF) are correctly configured, and a patch management schedule exists. If your provider cannot produce this evidence, or if security discussions have never come up in your relationship, that is a significant gap. Australia’s Notifiable Data Breaches scheme means that a security incident can carry legal and reputational consequences beyond just the technical damage — so this is not a box-ticking exercise.
Can I evaluate my IT provider without technical knowledge?
Yes — most of the meaningful evaluation criteria are about accountability, communication, and process rather than technical depth. Can they provide documentation? Do they report proactively? Have they discussed your IT roadmap? Do you understand your invoices? These are questions any business owner or operations manager can ask and assess without needing to understand the underlying technology. If you want a more technical review, consider engaging an independent IT consultant for a one-off audit — this can cost between $1,500 and $5,000 for an SME environment depending on scope, but it gives you an objective third-party view that’s hard to argue with.
How long should it take to switch IT providers?
A well-managed transition for a Sydney business with 20 to 100 staff typically takes four to eight weeks from the point of signing with a new provider to the point of full handover. The process involves environment discovery, documentation of all systems and credentials, configuration of monitoring and security tools, and a period of parallel support where both providers may be involved. Rushing this process creates risk — if documentation is incomplete or handover is done carelessly, you can end up with gaps that take months to find. A structured onboarding process, including a review of your backup and business continuity arrangements, should be a non-negotiable part of any new provider engagement.
How Kawco Can Help
Kawco is a managed IT provider based in Alexandria, Sydney. Since 2019, we’ve worked with businesses that want more than reactive support — companies that value structured environments, clear documentation, and a provider that takes long-term accountability seriously. If you’ve worked through this evaluate IT provider checklist and found gaps in your current setup, we’re happy to have a straightforward conversation about what good looks like for your specific environment.
We don’t use high-pressure sales tactics or make promises we can’t document. If we’re a good fit, we’ll say so clearly — and if we’re not, we’ll tell you that too. Get in touch with the Kawco team to arrange a no-obligation discussion about your current IT setup and what a structured, accountable approach would look like for your Sydney business.
