Start Right,
Day One IT Setup for a New Business,
Email, Devices, WiFi, Files, Microsoft 365
Why day-one IT matters more than most founders think
Most early-stage businesses move fast, choose tools quickly, and “sort IT later”. That is how you end up with lost documents, shared passwords, random personal emails running the company, and no clear way to onboard the first hire.
A good day-one setup does two things:
- Keeps everyone productive, from day one
- Reduces avoidable risk, from day one
You do not need enterprise complexity, you need sensible defaults.
The Start Right checklist
(do these in order) – If you only follow one section, follow this.
Step 1, Domain and email, get the foundation right
What you need
- A domain you own (not your developer, not a designer, not an agency)
- A business email system tied to that domain
- A password manager, from day one
Practical guidance
- Buy your domain from a reputable registrar, enable MFA on the registrar account, store recovery codes safely.
- Set up email on Microsoft 365 or Google Workspace, for most UK SMEs, Microsoft 365 is the better long-term fit if you expect growth, governance, and secure collaboration.
Common mistakes
- Domain owned by a third party, you will lose control during a dispute
- Shared inbox passwords, impossible to audit, impossible to secure
- No MFA, an avoidable compromise waiting to happen
Decisions to make now (and stick to them)
- One naming convention, for example:
- FirstName.LastName@Company.co.uk
- FirstName.L@Company.co.uk
- One naming convention, for example:
As attractive as it might look, it is better to use more than just the LastName for the user account/email ID!
- One shared mailbox approach, for example info@, accounts@, support@
- One rule, no business accounts on personal Gmail, ever
Step 2, Accounts and access, set the security baseline
As a start, since you are not an IT professional, you do not need to be “highly secure”, you need to be not-easy-to-hack.
Minimum security baseline
MFA for every account, no exceptions
- Separate admin accounts from day-to-day user accounts
- A password manager for everyone
- Recovery codes stored safely, not in the same inbox

If you are using Microsoft 365
- Turn on MFA tenant-wide
- Use Conditional Access where appropriate (even basic rules make a difference)
- Disable legacy authentication if still enabled
Security Baseline and Risk Review
Covers Microsoft 365 identity controls, email authentication (SPF/DKIM/DMARC), endpoint posture, backup recoverability, and priority remediation plan.
Step 3, Devices, standardise early to avoid support chaos
Your first 5–15 devices define your future support burden.
What to aim for
- 1–2 laptop models maximum
- Business-grade warranty and next-business-day support where possible
- Full-disk encryption enabled
- Endpoint protection, centrally managed
- A simple join and enrolment process, so a new hire can be productive in under 60 minutes
Practical buying guidance for non-technical founders
- Choose reliability and warranty over “highest specs”
- Prefer business lines (better support, longer parts availability)
- Do not allow staff to buy their own device for work unless you have a formal BYOD policy and a way to secure it
Step 4, WiFi and internet, keep it simple but correctly segmented
WiFi problems cause disproportionate pain. Fix the design once, then forget about it.
Minimum office network setup
- A business router and managed WiFi (not a consumer all-in-one)
- Two WiFi networks, Staff and Guest
- Guest network isolated from business devices and printers
- Strong WiFi password, rotated periodically, ideally WPA3
If you rely on internet to operate
- Have a backup connection plan, even a 5G backup can prevent downtime
- Document how to fail over, test it quarterly
Step 5, Files and collaboration, choose one system of record
This is where most businesses create chaos without realising it.
Rule 1, decide where work lives
If you use Microsoft 365:
- SharePoint for team files and shared folders
- OneDrive for personal working files and drafts
- Teams for conversations and quick sharing, but files should still live in the right SharePoint location
Rule 2, create a simple folder structure that scales
Start with a small, sensible structure:
- Company, Policies and Templates
- Finance
- Sales and Marketing
- Operations
- Projects (by client or by project)
- HR (restricted access)
Rule 3, set permissions by role, not by person
- Avoid granting permissions to individuals one by one
- Use groups, for example Finance Team, Leadership, Operations
Book a 30-minute review with us!
Covers Microsoft 365 identity controls, email authentication (SPF/DKIM/DMARC), endpoint posture, backup recoverability, and priority remediation plan.
Step 6, Backups and recovery, “we can restore” NOT “we have a backup”
Most businesses only learn this lesson after the first incident.
Day-one minimum
- For Microsoft 365, understand what Microsoft covers and what you are responsible for, then implement an appropriate backup strategy
- For laptops, ensure encryption, then ensure cloud file sync, then ensure restore capability
Your goal
- You can restore a deleted file
- You can recover access after an account compromise
- You can rebuild a laptop quickly if it fails
Step 7, Onboarding and offboarding, design it before the first hire
This is the most overlooked “day-one” step, but it saves time and reduces risk immediately.
Onboarding checklist
- Create account, assign licence
- Add to groups and Teams
- Configure MFA and recovery
- Device enrolment and security baseline
- Access to key tools and shared mailboxes
- Confirm file locations and folder structure
Offboarding checklist
- Disable account, revoke sessions
- Transfer ownership of files and mailbox
- Remove from groups and shared access
- Recover device, wipe if required
- Document what was done
Quick start option, a 90-minute “minimum viable setup”
If you need to be operational today, do this first:
Buy domain, secure registrar with MFA
Set up Microsoft 365, create users, enable MFA
Create shared mailboxes (info@, accounts@)
Standardise device approach for the next 3 hires
Create SharePoint structure, migrate critical files
Create Staff and Guest WiFi
Write one-page onboarding checklist and use it immediately
Then improve iteratively over the first 30 days.
Frequently asked questions:
- Service area: Start-up Enablement, Modern Workplace, Cybersecurity and Compliance, on the iTO.London Services page
- Support plans: Essential 10 and Essential 25 for smaller teams, Business and Concierge plans for larger teams or higher assurance
- Outcome: a secure, scalable setup with a clear onboarding process and a single system of record for files and collaboration
Book a 30-minute review with us!
Covers Microsoft 365 identity controls, email authentication (SPF/DKIM/DMARC), endpoint posture, backup recoverability, and priority remediation plan.