IT Security Quiz

IT Security Quiz

Disaster Recovery & Business Continuity

Why You Need An Employee IT Security Policy

From sales reports to employee social security numbers, IT is tasked with protecting your organization's private and confidential data. To accomplish this, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, information technology staff, and supervisors/managers.

How safe are your backups?

Did you know: 60% of backups are incomplete and 50% of restores fail?

Are Disaster Response Plans Necessary?

93% of small businesses without a disaster recovery plan, who suffered a major data incident, go out of business within one year!

Do you regularly backup your company data?
Do you have insurance that covers cybersecurity issues?
Do you have a cyberattack response plan in place?
Has your company had a cybersecurity audit in the past year?
Does your business have a business continuity plan in case of disasters or electronic failures?

Employee IT Policies

Why You Need An Employee IT Security Policy

From sales reports to employee social security numbers, IT is tasked with protecting your organization's private and confidential data. To accomplish this, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, information technology staff, and supervisors/managers.

Seriously?

54% of all security breaches are caused by dangerous software downloaded through a rogue email. Scanning your emails for viruses is essential in today's business world.

Employee IT Policy

Are your company emails scanned for viruses?
Do you have a strong password policy
Do you provide your employees with regular IT security training?
Do you have antivirus on your workstations?
Does your company have an electronic disposal policy?
Does your users have local admin rights on their PC’s?

Network Security

From sales reports to employee social security numbers, IT is tasked with protecting your organization's private and confidential data. To accomplish this, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, information technology staff, and supervisors/managers.

Network Security

Does your company monitor and control remote access sessions?
Do you have a firewall on your networks?
Is your network segmented to limit the damage of a possible breach?
Does your network have antivirus software?
Do you have WiFi for employees?
Is it secured with proper authorization and encryption?
Do you offer WiFi for guests or the public?
Is your public WiFi secured?

Physical Security Is Cybersecurity

From sales reports to employee social security numbers, IT is tasked with protecting your organization's private and confidential data. To accomplish this, you need to define acceptable and unacceptable use of systems and identify responsibilities for employees, information technology staff, and supervisors/managers.

Physical Security

Does your company maintain visitor logs?
Does your company have physical security for hardware?
Does your company have video surveillance?
Does your company have physical security access to servers rooms and other areas with sensitive information?
Do you have access control measures in place to prevent unauthorize access to restricted areas, equipment, and information?