Question Title

* 1. What is your email address?

Question Title

* 2. Does your organization backup its data?

Question Title

* 3. Are the backups structured so they cannot be impacted by ransomware?

Question Title

* 4. Does your organization have an IT security training program for users that includes regular email phishing testing?

Question Title

* 5. Have you had a Cybersecurity Assessment within the last two years?

Question Title

* 6. Does your organization use a firewall with ‘unified threat management’ services to filter out malicious traffic?

Question Title

* 7. Does your organization block connectivity to risky countries (Russia, China, Iran, North Korea, etc.)?

Question Title

* 8. Does your organization use a domain name system (DNS) filtering product to block connections to potentially malicious locations?

Question Title

* 9. Is centrally managed and regularly updated antivirus software run on all PCs and laptops?

Question Title

* 10. Are the users in your environment running 'restricted' user accounts?

Question Title

* 11. Does your organization have an Incident Response Plan (IRP) ready to enact in the case of a security incident/breach?

Question Title

* 12. Does your company have a Business Continuity Plan (BCP) in place in the event of an unexpected outage or loss of data?

T