* Value required to continue the assessment.
A - Company Name *
B - Email *
C - How good do you think your company's IT security is? Please choose from 1 to 7, where 1 is “not secured” at all and 7 is “totally secured”.
D - How dependent is your company on IT systems? Please choose from 1 to 7, where 1 is “not dependent” and 7 is “highly dependent”.
E - How do you consider the knowledge of the employees of the company about cyber security terms? Please choose from 1 to 7, where 1 is “there is no knowledge” and 7 is “high level of knowledge”.
1 - Are there any planned specific or refresher courses about cyber security?
1.1 - To whom are these courses directed?
2 - In your company are there any staff members with cyber security competencies?
3 - In your company is there one (or more) best practices/cyber security framework?
4 - What percentage of staff have administrative rights to company systems?
5 - What kind of Acceptable Use and Access authorization policies are adopted?
6 - How does authentication to login into the company’s network work?
7 - How often is it required to change of the password for access to the company’s network and to the company’s resources?
8 - How oftenIn case of intermediate frequencies choose the closest response (e.g. if it is performed every 5 months then choose a six-monthly frequency). If it is done bimonthly, then choose quarterly. do you subject your systems to a Vulnerability Assessment and then apply a Remediation Plan?
9 - Is an Intrusion Detection System in place?
10 - How often is a full backup performed?
10.1 - What type of backup is performed for files that have been modified between full backups?
10.1.1 - How often is an incremental or differential backup performed?
11 - Are there firewalls to protect the devices?