Is your facilities management process vulnerable?
- What type of facilities management system are you using?
Using a paper based system subjects you to losing valuable information . If the paper is lost or destroyed you could miss preventive maintenance tasks, violate warranties, and lose the ability to run reports on historical costs.
2. What type of electronic system are you using?
Email, spreadsheets, etc. Using separate systems leaves the door open for requests to get overlooked and for data to be lost. If requests are shared via email, only the people on the email chain can see the request details. Data can become out of sync if multiple versions of a spreadsheet are used.
3. Are you using an on-premise CMMS or a cloud-based CMMS?
Organizations using on-premise solutions typically cannot attain the same level of data redundancy and security that comes with cloud-based CMMS systems like FMX. Cloud-based systems utilize data centers and security protocols that have hundreds of millions of dollars invested in them to keep data secure and redundant.
4. How many people are using your CMMS?
If you only have one person using the CMMS, your workflow will likely suffer from bottlenecks—you will also be at risk of losing access to your system if that person leaves your organization. It is critical that all involved parties have access to your CMMS platform to avoid risk.
5. Does your CMMS have role-based user permissions?
Without the ability to designate user roles and permissions, you run the risk of having data deleted, records updated incorrectly, and private information exposed.
6. Are you scheduling preventive maintenance in your CMMS?
If you don’t properly schedule and execute preventative maintenance, your equipment will have a shortened life span and will operate at a reduced efficiency
Whether your facilities management process seems to be vulnerable or not, there’s always room for improvement.