Preparedness How prepared is your organization to manage threats related to your IT infrastructure? Data breach System infection Equipment failure Employee sabotage Assessment Can your organization properly assess threats to mitigate downtime and cost? Do you have an IT team to manage the assessment and threat Do you have a plan of execution to mitigate downtime and cost Recovery Does your organization have a recovery plan for returning to normal operations? Do you have an insurance policy for business interruption and/or a team that can execute a recovery plan How long can you wait for spare parts for aging or obsolete equipment How long can you sustain a suspended operation while you rebuild your IT infrastructure Time Requirement: 15 Minutes. Perfect Score is 50 Points CyberEyeΔCompany NameFirst NameLast NameEmailPhone Number (10 digit number with no formatting)BUSINESS DATAData protection and retentionQ1 - Do you perform daily on premise data backups of your servers and/or desktops? Yes (2 points) No (1 point) I Don't Know (0 points)Q2 - Do you maintain daily offsite copies of your data backups? Yes (2 points) No (1 point) I Don't Know (0 points)Q3 - Do you perform regular testing of your backed up data to ensure your backups are valid? Yes (2 points) No (1 point) I Don't Know (0 points)Q4 - Do you store monthly or annual archival backups to serve as permanent 'Not To Be Overwritten' backups? Yes (1 point) No (0 points)Q5 - Do you physically transport backups to and from your place of business to an offsite location? Yes, with a Protocol of No Stop Overs (1 point) Yes, but Without any Formal Policies or Protocols (0 point) No (0 points)Q6 - Is Your Backup Data Encrypted to prevent it from being compromised? Yes (1 point) No (0 points) I Don't Know (0 points)FIREWALL PROTECTIONRouters and firewall appliancesQ7 - In addition to your ISP provided Internet modem, do you have a business class router/firewall installed? Yes (1 point) No (0 points) I Don't Know (0 points)Q8 - If Yes to Q7, Do you subscribe to firewall protection services? Yes (1 point) No (0 points) I Don't Know (0 points)Q9 - If Yes to Q8 - Do you subscribe to an intrusion prevention service? Yes (1 point) No (0 points) I Don't Know (0 points)Q10 - If Yes to Q8 - Do you subscribe to a content filtering service to restrict user browsing? Yes (1 point) No (0 points) I Don't Know (0 points)Q11 - If Yes to Q8 - Do you subscribe to anti-virus/anti-malware services at the router level? Yes (1 point) No (0 points) I Don't Know (0 points)Q12 - If Yes to Q8 - Do you or your IT provider monitor your firewall security logs? Yes (1 point) No (0 points) I Don't Know (0 points)COMPUTER PROTECTIONLocal area networks, servers, desktops and mobile devicesQ13 - Do you have anti-virus/anti-malware software running on every device on your network? Yes (1 point) No (0 points) I Don't Know (0 points)Q14 - Do you have automated procedures for maintaining weekly desktop security updates? Yes (1 point) No (0 points) I Don't Know (0 points)Q15 - Do you have automated procedures for maintaining weekly server security updates? Yes (1 point) No (0 points) I Don't Know (0 points) Not Applicable (0 points)Q16 - Do you have a procedure to restore your business functionality in case of IT equipment failure or malunction or malicious attack? Yes (1 point) No (0 points)EXTERNAL THREATSExternal cyber threats and attacks, internal threatsQ17 - Identify all items you believe your company has addressed with respect to posing a threat to your business: Denial of Service attacks (DOS and DDoS) (1 point) DNS spoofing or “poisoning” (1 point) DNS Tunneling (1 point) Drive-by download attacks (1 point) Inside threats (1 point) Internet of Thing (IoT) attacks (1 point) Malware-based attacks (Ransomware, Trojans, etc.) (1 point) Man-in-the-middle attacks. (1 point) Password attacks (1 point) Phishing attacks (spear phishing, whaling, etc.) (1 point) Rootkits (1 point) Session hijacking (1 point) SQL Injection attacks (1 point) URL manipulation (1 point) My Company Does Not Possess The Knowledge to Answer This Question (0 points)Q18 - Do you store content such as banking card numbers, passwords, site logins within your browser? Yes (0 points) No (1 point)Q19 - Do you clean and maintain your browser cache regularly? Yes (0 points) No (1 point) I Don't KnowQ20 - Do you share passwords with others? Yes (0 points) No (1 point) Occassionally (0 points)Q21 - Do you email passwords within your organization or to third party personnel for things like technical support? Yes (0 points) No (1 point) Occasionally (0 points)Q22 - Does your business have a cyber insurance policy? - Select -Yes (1 point)No (0 points)That Information is Private and Cannot Be Shared (0 points)Q23 - If Yes to Q22, are your IT practices consistent with the requirements of your cyber policy?- Select -Yes (1 point)No (0 points)That Information is Private and Cannot Be Shared (0 points)Q24 - In the event of equipment failure would you require outside IT support to restore operations?- Select -Yes (1 point)No (0 points)Not Sure (0 points)Q25 - In the event of a cyber attack would you require outside IT support to restore operations?- Select -Yes (1 point)No (0 points)Not Sure (0 points)Q26 - In the event of an IT incident, can you yor business function day-to-day without your IT Infrastructure? Yes (2 points) Yes but diminished (1 point) No (0 points)Q27 - By choosing 1 option, how would you best describe your organization's tolerance to system downtime resulting from equipment failure or cyber attack? Can function for 1 business day (0 points) Can function for 2 business day (1 point) Can function for 3 business day (2 points) Can function for 4 business day (3 points) Can function for 5 business day (4 points) Can function for 6 business day (5 points) Can function for 7 business day (6 points) We are not dependent upon IT systems to conduct businessQ28 - If you do not have current system or data backups, can you resume your business after a cyber attack, data breach or data drive failure? Yes we can start fresh with new data (1 points) No (0 point)Q29 - How do you respond to the notion that no business is 100% protected from cyber threats or attacks? There is no perfect 100% protection plan from a cyber attack or data breach but best efforts should be implemented If there are no guarantees, why bother implementing any mitigating policies and proceduresADDITIONAL INFORMATIONIT budget considerationsQ30 - Is There Any Additional Information You Would Like to Provide?Would you like a representative to contact you regarding the results of this test?- Select -Yes - I am considering your CyberEye serviceNo - I just wanted to take the test for my own curiosityNo - I just wanted to perform my own evaluationSubmit Test