Score:
40.5out of 100
Details
Based on your results you have 10 major issues that could result in a major cybersecurity attack. Our free consultation and quote will help you identify what areas you need to focus on first and give you some immediate assurance your systems will be secure.
Request InfoMajor Issues (10):
Written Information Security Program (WISP):
States like Massachusetts require that all companies have a WISP at minimum.
States like Massachusetts require that all companies have a WISP at minimum.
Employee Training:
The weakest link in any cybersecurity plan is usually humans. Proper employee training helps with password strength/storage, detecting ransomware, preventing email phising and much more.
The weakest link in any cybersecurity plan is usually humans. Proper employee training helps with password strength/storage, detecting ransomware, preventing email phising and much more.
Backup Procedures:
Having proper backups in place can be the most important tool in cybersecurity. They help with system outages, prevent ransomware attacks and ensure your data is protected even in a catastrophe.
Having proper backups in place can be the most important tool in cybersecurity. They help with system outages, prevent ransomware attacks and ensure your data is protected even in a catastrophe.
Vulnerability Assessment:
A vulnerability assessment is a great start to a successful cybersecurity plan. It gives you an overview of any current vulnerabilities in your network, creates a device inventory with a current status for each and provides a report for suggested updates / fixes / upgrades.
A vulnerability assessment is a great start to a successful cybersecurity plan. It gives you an overview of any current vulnerabilities in your network, creates a device inventory with a current status for each and provides a report for suggested updates / fixes / upgrades.
Penetration Test:
Running annual penetration tests ensures that your network is secure against potential threats. These tests involve a team of hackers trying to penetrate your system the same way a real threat would. After the test a report is provided detailing their findings and suggested fixes.
Running annual penetration tests ensures that your network is secure against potential threats. These tests involve a team of hackers trying to penetrate your system the same way a real threat would. After the test a report is provided detailing their findings and suggested fixes.
System Patches & Updates:
A new system install can be out of date or require a major security patch as soon as hours after installing it. Having a set process and schedule for updates ensures your systems are always up to date and secure.
A new system install can be out of date or require a major security patch as soon as hours after installing it. Having a set process and schedule for updates ensures your systems are always up to date and secure.
Password Management Tool:
Having a password management in place allows you to use strong passwords without having to remember them. It also allows you to easily share passwords with other team members without emailing or messaging them.
Having a password management in place allows you to use strong passwords without having to remember them. It also allows you to easily share passwords with other team members without emailing or messaging them.
Managed IT Team:
Having an internal or subcontracted IT team helps to ensure that new devices are configured correctly and software patches and updates are made on a regular schedule.
Having an internal or subcontracted IT team helps to ensure that new devices are configured correctly and software patches and updates are made on a regular schedule.
Cybersecurity Policies:
It's important to have internal policies in place for events such as disasters, breaches and new vendors.
It's important to have internal policies in place for events such as disasters, breaches and new vendors.
Website Security
While many overlook their website in their cybersecurity plans it's a very important piece. Hackers can compromise your site and take it offline, intercept payment information, send emails from your actual domain to other employees as part of phishing or ransomware attacks and even steal passwords for user accounts.
While many overlook their website in their cybersecurity plans it's a very important piece. Hackers can compromise your site and take it offline, intercept payment information, send emails from your actual domain to other employees as part of phishing or ransomware attacks and even steal passwords for user accounts.