• personWelcome:
  • question_answerinfo@ciostreet.com
  • perm_phone_msg(800) 833-5139

Cyber Security Check-Up

Cyber Security Check-Up - Short Version

Category I - System Access

1. Does your IT organization have formalized policies and procedures for network and application access?

2. Does your IT organization use a tiered approval system to grant access to the network and applications?

Category II - Networks & Email

1. Does your organization use multiple vendors and network connections between locations/cloud and the Internet for redundancy?

2. Does your IT organization monitor network connectivity 24/7?

Category III - Data Security

1. Is data encrypted at rest for all enterprise systems?

2. Does your organization use a data traffic monitoring system to provide early warnings of anomalous access and data movement?

Category IV - User Security

1. Does your IT organization automatically load and update user and enterprise hardware with antivirus software?

2. Does your IT organization regularly perform user phishing tests?

Category V - Policies & Procedures

1. Does your IT organization develop and practice a cloud security policy and procedure?

2. Does your organization develop and provide a formal Privacy Policy for customer and user data?

Category VI - Change Controls

1. Does your IT organization develop and use formal change management policies and procedures?

2. Does your IT organization require testing of all changes prior to implementation?

Category VII - Business Continuity

1. Does your organization use multiple data centers with high-availability failover capabilities, or cloud computing environments with high-availability failover capabilities, or a mixed approach of both data centers and cloud environments with high-availability failover capabilities?

2. Does your IT organization use and regularly test appropriate backup and recovery processes?

Category VIII - Software Development

1. Are all web sites designed to prevent DoS and/or DDoS attacks?

2. Do all software development efforts follow a standard security abatement design including prevention for SQL injection and spoofing?

Complete this form and immediately see your results!

: Registered Guests enter Email and Phone

(We promise not to harass you with uninvited solicitations or share your data with a 3rd party)