Assessment 1. Compile/update inventory of all information technology related assets for the LSCOG Office located at 2748 Wagener Road, Aiken, SC 29801. 2. Assess system architecture and current processes and make recommendations for improved IT system performance. Implementation 1) Provide necessary Workstations/Desktop equipment and configuration with the latest version of Windows and Microsoft Suites. (Estimated 25-35). 2) Setup and Configuration with ongoing support and any configuration changes that need to be made over the contract period. 3) Initial Setup, Implementation, and Training 4) Cloud Storage Back up for Disaster Recovery 5) Security Encryption, Monitoring and Management 6) Email archiving 7) Daily backup of key systems (finance, administration, etc.) 8) Weekly backup of non-key user file systems 9) Server Threat monitoring and analysis, threat detection, response and remediation. (24/7 Remote Monitoring and Support, MS Patch, Anti-Virus License and Management, Monthly Report) 10) Maintain a high level of overall internet security. a. Internet security must meet all Federal, State, and local laws and regulations regarding confidential information, such as but not limited to, 20 CFR Part 603, 45 CFR Section 205.50, 20 USC 1232g, 34 CFR 361.38, S.C. Code Ann. §§ 41-29-150 through 170 and IRS Publication 1075. b. Recommend and assist with Cybersecurity. c. Provide annual staff Cybersecurity awarness training as well as additional security awarness training when deemed necessary. 11) Desktop Management with (at minimum) Business Hour Helpdesk, Microsoft Patching, Endpoint Protection License and Management, Monthly Report 12) Workstations Threat monitoring and analysis, Threat detection, response and remediation. 13) Firewall Software/Service 14) Deployment plan for replacement PCs and laptops as needed, including installation of updates, application software, and network and peripheral device configuration as needed in the future. 15) Day-to-day troubleshooting of hardware and software issues and network. This support should extend to peripheral devices such as monitors, keyboards, mice, copiers, printers, etc. 16) 24/7 monitoring of key systems with automated failure notification. 17) Daily (7:30 am-5:30 pm) help desk coverage for key systems with 1-hour reply time and 24-hour target response time (or better). 18) Daily (7:30 am-5:30 pm) helpdesk coverage for laptops and PCs with 1-hour reply time and 24-hour target response time (or better). 19) Timely repair of failures or malfunctions on all systems, including malware infections, intrusion detection, and other security breaches 20) Timely assistance with changes and reconfigurations on systems, including implementation of security best practices. 21) Timely assistance interacting with external software or hardware vendors to install, configure, troubleshoot, or repair systems. 22) Logging and reporting of requests for assistance, ideally including an online support ticket portal. 23) Comprehensive patch management for covered equipment, including OS patches and application patches and installation of upgrades. Alert notifications to designated personnel in the event of failure. 24) Complete proactive monitoring of network equipment including bandwidth utilization, and other performance indicators, with reporting when specified thresholds are reached. 25) Ensure scheduled preventive maintenance for equipment is properly and promptly performed; maintain the maintenance records on the equipment; Regular maintenance for servers, PCs, switches, and other network equipment, including regular review of system logs to identify security and maintenance issues. 26) Develop operations, administrative, and quality assurance back-up plans and procedural documentation. 27) Setup new users and edit or remove existing users in environment. 28) Onsite support engineers as needed. 29) Assistance with developing specifications for new equipment and/or software or identifying appropriate hardware or software solutions, including preparing quotes for purchase. 30) Record keeping and administration for maintenance and support contracts and license management for server and network-related software, including timely notification of pending contract and/or license renewals. 31) Development and maintenance of administrative documentation for systems and applications. 32) Input and advice on implementation of new capabilities and systems, including cloud-based options. 33) Input, training and advice on security/cybersecurity best practices. 34) Input and advice on preparation of annual IT plans and budgets, including budgetary estimates for specific recommendations and proposals. 35) Assistance maintaining continuous operations during disaster recovery scenarios. 36) Work with the LSCOG primary staff contact to: a. Work on all services provided. b. Work on an annual technology budget for recurring expense items and new capital requirements. c. Assist with ongoing and annual training and reporting Cybersecurity protocols. d. Make technology upgrade suggestions. e. Analyze the data collected and offer resolutions for issues and potential risks.