opens in a new window
opens in a new window
opens in a new window
opens in a new window
Blog
Careers
Case Studies
Contact Us
Support
Technology Strength Score
Information
Cloud Solutions
Cloud Communications
Data Security & Compliance Solutions
Managed IT Solutions
Physical Security
Video Surveillance Solutions
Print
Managed Print Services
Print Application Solutions
Communication
Business Phone Systems
Advanced Mobility Solutions
Cloud-Based Unified Communications
Contact Center Services
Call Recording Systems
Conference Call Services
Unified Communications
Networking Solutions
SD-WAN
Carrier/Internet Services
Cyber Threat Assessment
SD-WAN
Process
Business Process Solutions
Managed Print Center
Managed Mail Centers
Receptionist Services
Document Conversion
Secure Document Storage
Content Management Solutions
Facilities Management Solutions
Print Fulfillment Solutions
Voice Processing Solutions
Industries
Education
Engineering & Construction
Financial Services
Healthcare
Insurance
Manufacturing & Logistics
Real Estate
State & Local Governments
Information
Cloud Solutions
Cloud Communications
Data Security & Compliance Solutions
Managed IT Solutions
Physical Security
Video Surveillance Solutions
Print
Managed Print Services
Print Application Solutions
Communication
Business Phone Systems
Advanced Mobility Solutions
Cloud-Based Unified Communications
Contact Center Services
Call Recording Systems
Conference Call Services
Unified Communications
Networking Solutions
SD-WAN
Carrier/Internet Services
Cyber Threat Assessment
SD-WAN
Process
Business Process Solutions
Managed Print Center
Managed Mail Centers
Receptionist Services
Document Conversion
Secure Document Storage
Content Management Solutions
Facilities Management Solutions
Print Fulfillment Solutions
Voice Processing Solutions
Industries
Education
Engineering & Construction
Financial Services
Healthcare
Insurance
Manufacturing & Logistics
Real Estate
State & Local Governments
Technology strength assessment – new
Technology strength assessment – new
Information Assessment
Print Assessment
Process Assessment
Communication Assessment
Personal Information
Part I
Part II
Do you execute periodic vulerability scans in order to test for your security position?
Yes
No
Do you enable multi-factor authentication, for administrator and user accounts, in order to improve security for all accessed systems including email, line-of-business and VPN?
Yes
No
Are your business's password and password change policies managed centrally and strong enough to protect your data?
Yes
No
Is your server data backed up nightly with more than one instance that is stored off-site or in the cloud?
Yes
No
Do you have someone patch your servers and computers at least once a month?
Yes
No
Do you have procedures in place to review updates for your corporate firewall(s)?
Yes
No
Are you confident that all computers in your company have a common anti-virus program that is centrally managed and that the computers consistently receive updated signature files?
Yes
No
Do you have a procedure to perform restoration tests of your backups in order to assure they are working properly?
Yes
No
Do you have a written Disaster Recovery Plan that includes IT systems and is revised once or twice a year?
Yes
No
Do you utilize device monitoring software in order to detect and remediate system issues and concerns quickly?
Yes
No
Save For Later
In the event of a power outage, do you know that you have a battery backup system that will keep your router, firewall and servers running for a minimum of 30 minutes?
Yes
No
Do you utilize security awareness training to make sure users are trained to avoid email and web-based hacking attempts?
Yes
No
Do you have software and operating systems that are in end-of-life status?
Yes
No
Do you utilize server virtualization in order to leverage fault tolerance and disaster recovery gains?
Yes
No
Do you have the ability to send encrypted email when sharing potentially sensitive information?
Yes
No
Do you assess your technology vendors annually to ensure they extend your security standards and policies?
Yes
No
Do you share written Internet Usage and Corporate Email policies with your end users?
Yes
No
Do you have an operable employee onboarding and offboarding policy as it relates to IT?
Yes
No
Do you have a multi-cloud strategy that ensures common authetication, security and policies apply across all cloud vendors?
Yes
No
Do you have computers that are older than five years?
Yes
No
Save For Later
First Name
Company Name
Email Address
How did you hear about this assessment ?
Select any Option
Van Ausdall Sales Rep
Google
Email
Expedient
Save For Later