Please enable JavaScript in your browser to complete this form.
4. Do you allow any of the above information to be e-mailed? * Yes No Unsure
5. Do you allow any of the above information to be stored or transmitted in a cloud file-sharing application such as Dropbox, Google Drive, etc.? * Yes No Unsure
6. Do you have crime insurance? * Yes No Unsure
7. Do you have privacy screens on computer monitors in publicly viewable areas, such as your reception desk? * Yes No Unsure
8. Do you have a “clean desk” policy stating that employees should not leave sensitive documents lying on their desk when the desk is not monitored? * Yes No Unsure
9. Do you have video surveillance in place at your facility? * Yes, interior only Yes, exterior only Yes, interior and exterior No Unsure
10. Do you provide cyber security awareness training to your staff? * Yes No Unsure
12. Do you require that employees sign off that they have read and understand these policies? * Yes No Unsure
13. Does anyone audit and verify that employees are following the above policies? * Yes No Unsure
14. Where do you store your list of credentials for your employees? *
15. Do you have up-to-date documentation of your network to know exactly what devices, users, software, or other IT assets you have? * Yes, and I am confident that it is current Yes, but I am NOT confident that it is current No Unsure
16. Are there any specific concerns you have regarding cyber security?
17. Do you have an Active Directory server on your network? * Yes No Unsure
18. How many PCs (Windows or Linux Workstations) are on the network? * None 1-10 11-50 51-99 100+ Unsure
19. How many Macs are on the network? * None 1-10 11-50 51-99 100+ Unsure
20. How many Mobile Devices are on the network? (tablets, smartphones, etc.) * None 1-10 11-50 51-99 100+ Unsure
21. Are all company-assigned mobile devices encrypted and password-protected? * Yes No Not Applicable Unsure
22. How many printers, scanners, or plotters are on the network? * None 1-10 11-50 51-99 100+ Unsure
23. How many Internet of Things (IoT) devices (light bulbs, smart switches, etc.) are on the network? * None 1-10 11-50 51-99 100+ Unsure
24. Is authorization required before an employee may load software onto their computer? * Yes No Depends on employee role Unsure
25. How often is data backed up? * Never Daily Weekly Monthly Quarterly Yearly Unsure
26. Are backups automatically sent offsite? * Yes No Unsure
27. Are backups stored on encrypted media? * Yes No Unsure
28. Do you periodically perform test restores of data backups? * Yes No Unsure
28-2. How often are the test restores of data backups performed? * Weekly Monthly Quarterly Yearly Unsure
29. Do you perform external vulnerability assessments? * Yes No Unsure
29-2. How often are the external vulnerability assessments performed? * Weekly Monthly Quarterly Yearly Unsure
30. Do you perform internal vulnerability assessments? * Yes No Unsure
30-2. How often are the internal vulnerability assessments performed? * Weekly Monthly Quarterly Yearly Unsure
31. Is the server room/closet locked? * Yes No We do not have a server room/closet
32. Is the use of shared credentials allowed for any systems? * Yes No Unsure
33. Do you have spam filtering in place? * Yes No Unsure
33-2. What is the name of the spam filtering service in place? *
34. Do you have an antivirus service in place? * Yes No Unsure
34-2. What is the name of the antivirus service in place? *
35. Do you have a host protection service in place? * Yes No Unsure
35-2. What is the name of the host protection service in place? *
36. Do you have a firewall in place? * Yes No Unsure
36-2. What is the name of the firewall device in place? *
37. Do you have an IDS/IPS or Windows Application Firewall in place? * Yes No Unsure
37-2. What is the name of the IDS/IPS or Windows Application Firewall in place? *
38. Is there a guest network in place for visitors to your site? * Yes, WiFi only Yes, ethernet cable only Yes, both WiFi and ethernet cable No Unsure
39. Do you allow visitors to your office to connect to your primary office WiFi network (not a guest WiFi)? * Yes No Unsure
40. Do you limit the amount of time a guest can be connected to a wireless network? * Yes No Not Applicable Unsure
Please include any additional information with regards to the Cyber Security of your organization that we should consider for this Cybersecurity Assessment: