Skip to content
Search for:
Services
Network Design & Installation
Cybersecurity Management
Complete Technology Integration
Eliminate Downtime
Full-Service Technical Support
Dark Web Scan
Schedule an Onsite Technology Assessment
Our Clients
About
The Advantage Tech Difference
Process
Where We Work
Resources
Videos & Webinars
Tech Tips
News
Contact
Contact Us
Get Started
877-723-8832
Client Support
Search for:
Services
Network Design & Installation
Cybersecurity Management
Complete Technology Integration
Eliminate Downtime
Full-Service Technical Support
Dark Web Scan
Schedule an Onsite Technology Assessment
Our Clients
About
The Advantage Tech Difference
Process
Where We Work
Resources
Videos & Webinars
Tech Tips
News
Contact
Contact Us
Get Started
877-723-8832
Client Support
Services
Network Design & Installation
Cybersecurity Management
Complete Technology Integration
Eliminate Downtime
Full-Service Technical Support
Dark Web Scan
Schedule an Onsite Technology Assessment
Our Clients
About
The Advantage Tech Difference
Process
Where We Work
Resources
Videos & Webinars
Tech Tips
News
Contact
Contact Us
Get Started
877-723-8832
Client Support
Live Event Survey
Call 1-877-723-8832
Tap for Client Support
Self Assessment
advtech
2019-04-18T11:28:16-04:00
Self Assessment
Please answer the questions below about your current IT work environment.
Name
First
Last
Email
1) A firewall is one of the key components of network security - Which of these best describes your office firewall?
Choose One
We have a next generation firewall (SonicWall, Sophos, etc) that is on security subscriptions and updated continually
We have a next generation firewall but I am not sure of the update status or subscriptions.
We have a basic firewall, but it is not managed or on any subscriptions.
We don't have a firewall, just the basic router that our internet service provider gives us.
2) Let's talk about your WiFi system. Which best describes how your WiFi works?
Choose One
We have one WiFi system in our office.
We have one WiFi for staff and one for guests.
We all use the guest WiFi except for items that must have access to sensitive information.
3) Anti-Virus. It's a big deal. Which one describes you best?
Choose One
I think we have an anti-virus.
We have an anti-virus on every workstation and servers, but I am not sure how often it is updated.
We have an anti-virus on every workstation and servers, and we have an active update subscription, but I am not sure where we keep the documentation on that.
We have an anti-virus on every workstatoin and server, with an active subscription, and updates are documented and readily available.
4) Data encryption is another key component of security. Which best describes your office?
Choose One
Our server and laptops are fully encrypted, and I have the physical key in my possession.
I think we are encrypted. Not totally sure.
It has never been discussed, I would be curious.
5) IT management - which best describes what your IT provider is doing?
Choose One
We have a guy that we call when there is a problem.
We have an IT company that we use for tech support when we have an issue.
We have an IT company that manages our whole network, but we purchase things like firewalls, anti-virus, etc as they come up for renewal.
We have an IT company that managed our whole netowrk and provides our firewalls, security, subscriptions, etc as part of their process.
We have an IT company that managed our whole netowrk and provides our firewalls, security, subscriptions, etc as part of their process. They also maintain all of our system documentation for compliance purposes.
6) Server backup - this one is critical. What best describes you?
Choose One
Not sure about the status of our backup.
We do a backup every night, but I do not know that we have actually tested it.
We do a backup every night, and we periodically test it.
We do a local backup every night, and it is copied to the cloud as well.
We have a backup appliance that does a complete backup every hour and can take over in the event there is a problem with our server. It backs up to the cloud every night.
7) How long does it take for your IT provider to respond when you have an issue?
Choose One
30 minutes or less.
Usually in an hour or two.
Usually by the end of the day.
Yeah, that's a big issue.
8) Do you have an acceptable use policy for all employees regarding the computer system?
Choose One
What's that?
I think so.
For some of our people, but not everyone.
Yes, and a signed copy is in their employment agreement.
Great. Make sure this is part of your onboarding process for all new employees.
Yes, and a signed copy is in their employment agreement.
Yes, and a signed copy is in their employment agreement.
9) Are you using business class e-mail and using secure messaging when needed?
Choose One
My e-mail address ends in AOL, gmail, msn, etc.
We use business e-mail (mycompanyname.com), but I do not think we have secure e-mail.
We use business e-mail (mycompanyname.com), and we use secure messaging when transmitting sensitive information.
10) Does your network filter out bad stuff (facebook, porn, general time wasters, etc)?
Choose One
I do not think we have that filter in place.
Some, but it's pretty basic.
Yup, it is covered and regularly updated.
11) Last question - how often does your team do cybersecurity awareness training?
Choose One
Annually, and it is documented in their HR file.
We have done it, but not recently.
We have not gotten around to that yet.
Hidden
Final Score