If your internet goes down, a computer won’t log in, or the phones stop ringing… who knows what to do?
In a lot of small businesses, the answer is: one person. A tech-savvy employee, the owner’s “computer friend,” or a vendor who set things up years ago. And when that person is on vacation (or disappears), everyone’s stuck.
The fix isn’t complicated: build an IT Binder—a simple set of notes and logins that lets you get help fast, avoid downtime, and keep your business running.
This isn’t about turning you into IT. It’s about making sure you’re never stranded.
An IT Binder is just a single source of truth for the basics:
who your vendors are
what equipment you have
how to access critical accounts
what to do when something breaks
It can be a physical binder plus a digital version (recommended). The goal is: any trusted manager can open it and take action.
Include:
Internet provider support number + account number
Phone/VoIP provider support number + account number
IT support (current vendor or internal contact)
Alarm/camera vendor
Copier/printer vendor
Line-of-business software support (POS, scheduling, estimating, etc.)
Tip: Add a short note like:
“Internet down = call ISP first, then IT.”
List the platform and the admin contact email for:
Email (Microsoft 365 / Google Workspace)
Domain/DNS (where your website/email settings are controlled)
Website host (if different)
VoIP portal
Password manager (if you use one)
Backup portal (if you have one)
You don’t need to print passwords here if that feels risky—just document where the passwords are stored and who can access them.
Write down your standards so everyone follows the same playbook:
Do you require MFA (multi-factor authentication)? (You should.)
What password manager is approved?
Who is allowed to reset passwords?
What happens when someone leaves?
This alone prevents “shared Gmail password on a sticky note” situations.
This is huge for security and sanity.
Onboarding (new hire):
Email account created
MFA enabled
Shared mailbox access (if used)
App access granted (accounting, scheduling, file shares)
Printer access set
VoIP extension assigned
Offboarding (employee leaves):
Disable email immediately
Reset shared passwords they knew
Remove from shared apps
Forward email if needed
Collect devices/keys
Document what access they had
Track:
Computers (name/label, user, location)
Server/NAS (if any)
Printers/copiers
Network gear (router/firewall, switches, Wi-Fi access points)
VoIP phones
Backup drive or cloud backup service
Tip: Put a label on devices like “Front Desk PC” or “Back Office Printer” so support calls are painless.
Don’t print the Wi-Fi password in a public binder. Do document:
Network names (Staff Wi-Fi, Guest Wi-Fi)
Where the router and Wi-Fi equipment are located
Who has authority to change Wi-Fi passwords
A reminder: Guest Wi-Fi should be separate from business devices
If you must store the Wi-Fi password, keep it in a password manager and document how to access it.
Most businesses think they have backups until the day they need one.
Document:
What is backed up (server, files, QuickBooks, PCs, etc.)
Where backups go (cloud, external drive, NAS)
Who can restore data
When the last restore test was performed
Add a simple note: “Backups aren’t real until tested.”
List critical apps and renewal dates:
Accounting
Scheduling/CRM
Design/print software (if relevant)
Antivirus/EDR
Backup subscription
VoIP subscription
This prevents surprise shutdowns because a card expired or a renewal was missed.
Give your team a calm script.
Example:
If internet is out: check modem lights → reboot modem/router → call ISP → call IT
If one PC is slow: restart → check if updates are pending → report to office manager
If email login fails: verify MFA code/time → reset password through approved method
Keep it short. The goal is reducing panic and speeding up escalation.
Any time someone changes something important, log it:
Date
What changed (new Wi-Fi password, new printer, new vendor, etc.)
Who did it
Why
This prevents the dreaded: “It worked yesterday… nobody knows what changed.”
Best practice:
Digital binder in a shared, access-controlled folder (Google Drive / OneDrive)
Passwords in a password manager (not in a Word doc)
Printed emergency page (vendor list + steps) kept somewhere secure