Cybersecurity Assessment Step 1 of 12 0% Name* First Name Last Name Title* Company* Address* City* State* Zip Work Phone* Email* Number of PCs in your office* -- Please Select --1-1011-5051-100100+ Who currently supports your network?* How did you hear about us? -- Select One --Direct Mail LetterGoogle SearchWhite PaperNewsletterReferralEmailOther If you have a Promo Code, please enter it here Security Assessment It's important to establish a baseline and close existing vulnerabilities. When was your last assessment? Never More than 5 Years Ago More than 2 Years Ago Last Year This Year Spam Email Most attacks originate in your email. Your systems need to be secure and reduce spam. How many spam email messages do you receive on a daily basis? 26+ 11-25 6-10 1-5 None Security Policies Security policies are important for the safety of your data. Strong policies should deny or limit USB storage access, enable enhanced password policies, set user screen timeouts, and limit user access. How confident are you in your security policies? What Policy? Not Confident Not Sure Confident Fort Knox Level Security Awareness Train your users - often! Teach them about data security, email attacks, and your policies and procedures. Rate your Security Awareness Training Program. What Program? Not Good Not Sure Good Great Advanced Endpoint Security Protect your computers and data from malware, viruses, and cyber attacks with advanced endpoint security. Today's latest technology (which replaces your outdated anti-virus solution) protects against file-less and script based threats and can even rollback a ransomware attack. Rate your current Endpoint Security. None At All Out-dated Not Sure Sufficient Excellent Multi-Factor Authentication Utilize Multi-Factor Authentication whenever you can including on your network, banking websites, and even social media. It adds an additional layer of protection to ensure that even if your password does get stolen, your data stays protected. How often do you use Multi-Factor Authentication? Never Rarely Sometimes Usually Always Computer Updates Keep Microsoft, Adobe and Java products updated for better security. Critical update services can be automated to protect your computers from the latest known attacks. How frequently are your systems updated with the latest software and patches? Never When we remember Sometimes Usually Always Dark Web Research Knowing in real-time what passwords and accounts have been posted on the Dark Web will allow you to be proactive in preventing a data breach. How often do you check the Dark Web for stolen credentials? What’s the Dark Web? Never Once Sometimes Constantly Monitored Firewall Turn on Intrusion Detection and Intrusion Prevention features. Send the log files to a managed SIEM. How well is your IT team managing your Firewall? What IT team? What Firewall? Not Sure Good Great Encryption Whenever possible, the goal is to encrypt files at rest, in motion (think email) and especially on mobile devices. Rate your current encryption policies. Nothing is encrypted Rarely Sometimes Often Everything is encrypted Backup Backup local. Backup to the cloud. Have an offine backup for each month of the year. Test your backups often. Rate your current backup situation. None Rarely Not Sure Routinely Everything Email This field is for validation purposes and should be left unchanged.