1-in-blue-circle

SECURITY AWARENESS


Employee errors are the #1 source of data breaches. Indicate how well informed, educated and aware your employees are in the following areas.

Email-Icon

Email

Employees know how to identify potential phishing scams, harmful attachments and spam.

No

Not Sure

Yes

Password-Icon

Passwords

We routinely update passwords to contain complex configurations and have a procedure for securing them.

No

Not Sure

Yes

Shadow-IT-Icon

Shadow IT

Policies are in place to manage employees who use unauthorized file share programs, personal devices, external hard drives, social media, etc.

No

Not Sure

Yes

vCIO

HARDWARE & SOFTWARE


Desktop computers, devices, accessories, servers and multiple software programs used to conduct business all have their own security requirements. Where do you rank?

Computer-Icon

Computers

Our computers have been purchased in the last three years and all required system upgrades have been installed in that time.

No

Not Sure

Yes

Software-Icon

Software

All software programs have received necessary updates and antivirus measures are in place.

No

Not Sure

Yes

Compatibility-Icon

Compatibility

Any specialized equipment (machine sensors, voice assist, legacy systems, etc.) and software can easily “talk with each other” securely.

No

Not Sure

Yes

vCIO

ENDPOINT SECURITY


Remote access to your networks from wireless devices, such as smartphones, tablets and personal laptops, can create pathways for security threats. How are you doing with the following endpoint security measures?

Personal-Devices-Icon

Personal Devices

Policies are in place for employees who use personal devices for work to prevent data loss, and those devices have updated security software.

No

Not Sure

Yes

Firewalls-Icon

Firewalls

Our network security and firewall systems are regularly updated and monitored to ensure the latest and greatest defenses are in place to protect against internet-based cyber threats.

No

Not Sure

Yes

Monitoring-Icon

Monitoring

Our systems are monitored 24/7 to ensure critical updates are applied, maintenance is performed and dedicated IT personnel are addressing emerging threats related to cloud-based security protection.

No

Not Sure

Yes

vCIO

PRINTER SECURITY


Modern printers and copiers are connected to networks and have the ability to email, scan, fax, store data and, yes, even print! They need to be protected just as much as computers. How does your organization rate?

Printed-Documents-Icon

Printed Documents

We have a policy in place to ensure that confidential printed documents don’t end up in the wrong hands.

No

Not Sure

Yes

Rules-Based-Printing-Icon

Rules-based Printing

We have PIN-access or swipe-to-print protection measures in place to release print jobs only when an authorized user is present to retrieve printed documents.

No

Not Sure

Yes

Security-Settings-Icon

Security Settings

Job tracking, hard drive encryption, password protection, remote monitoring and proper network configurations are in place and are routinely updated.

No

Not Sure

Yes

vCIO

BACK-UP SYSTEMS


Even when robust security measures are in place, there’s no 100% guarantee. Systems may be compromised through employee error, malfunction or natural disaster. How would you rank your ability to restore data?

Cloud-Services-Icon

Cloud Services

We’ve replaced antiquated on-site or tape backup systems with cloud-based backup capabilities that continually update to ensure data can be restored quickly.

No

Not Sure

Yes

Business-Continuity-Plan-Icon

Business Continuity Plan

We’ve outlined a detailed plan in the event a disruption occurs with clearly defined processes, and identified who will take certain actions.

No

Not Sure

Yes

Testing-Icon

Testing

Our backup system is regularly tested to ensure operation if called to duty, and we’ve conducted a practice drill.

No

Not Sure

Yes

Get your instant cybersecurity risk score!

Please enter First Name Please enter Company Name Please enter Email Address