MSSP Assessment Home » Business Technology » Managed Cyber Security Services » MSSP Assessment Take the kinetix cyber security assessment, today! Every employee at your business is at risk. Take this free assessment to learn more about the cyber security health of your business. Please enable JavaScript in your browser to complete this form.1234567891011Do you have any sort of cyber security policy in place? *NoYesHaving cyber security measures is just like having an alarm system. These days, the most valuable information you have is housed digitally on your computers, servers, and in the cloud. Protecting that information should be a #1 priority for your organization and a cyber security policy is your company’s guide book for implementing these security measures.Are you confident that the policy you have is complete and fully put into practice in order to protect you in an attack? If you aren’t, then give us a call and we can assess your current security policies and ensure that they are sufficient. NextDo you have a cyber security insurance policy? *NoYesWe can help you with the steps required in order to obtain insurance, or to keep your current policy active. Having a Cyber Security insurance policy is just as important as any other insurance policy you have in place for your organization.Great! If you do have a policy, be aware that many security processes that formerly were “recommendations” will now be requirements to remain insured. Chances are that your insurance will soon require that you have certain security measures in place before renewing your insurance policy. NextDo you use MFA (Multi-Factor Authentication)? *NoYesEach employee is a gateway to getting hacked. Compromised passwords are one of the most common ways that hackers can get at your data, your identity, or your money, so using multifactor authentication is one of the easiest ways to make it a lot harder for them. MFA should protect logins to email, critical servers, remote access solutions, cloud applications, etc.Wonderful! You are protecting one of the ways that hackers can easily infiltrate your system. Now, ensure that all systems that touch secured data or provide remote access are protected by MFA.NextDo you use an email encryption solution when sending sensitive data through email? *NoYesWhen individuals include sensitive information to clients or coworkers — like banking, personal identification info, passwords, health information, etc. — in emails, this data can be vulnerable to malicious attacks. Using an end to end encryption technology, an email’s contents are disguised, protecting them by making them illegible to hackers, cybercriminals, and other unintended parties. There are also many compliancy standards that require an email encryption solution. If you are in a healthcare or legal industry, this is a requirement.Fantastic! You are ensuring that the emails you send are secure and less vulnerable to malicious attacks.NextDo you have Spam filtering in place for your email? *NoYesA spam filter limits unsolicited, unwanted and virus-infected emails and prevents those messages from getting to a user's inbox. Not only does it keep garbage out of your inboxes, it drastically improves the quality of life of business emails because they run smoothly. Business will always be a target for spam mail, but a quality email filter will drastically reduce the phishing attacks and malicious content received by end-users.Great! Spam filtering is extremely important not only for your security, but also for the efficiency of your emails.NextDo you have any Anti-Virus protection? *NoYesViruses can come from anywhere, and each computer is a gateway to a virus infiltrating your system. Following one wrong link or opening one malicious attachment can quickly compromise your computer before you even realize you are under attack. We offer Next Gen Anti-Virus Protection, which is one of the most important steps for protecting your business against these cyber-attacks.Running a standard AV is great, but be aware that most insurance policies will require Next Gen AV within the next year to remain covered under a Cyber Security policy. If you already have Next Gen AV, you are ahead of the game! If you aren’t sure if your AV solution is in this category, give us a call.NextDo you have a capable firewall? *NoYesFirewalls are absolutely essential in stopping virus attacks, monitoring network traffic, preventing hacking, stopping spyware and blocking unapproved websites. They are your first line of defense against unauthorized, external users, so choosing a good firewall solution for your business is critical.If you have a firewall, but are unsure that it is protecting you completely, we can do an assessment to ensure you are secure.NextDo you have a data back up and are you capable to restore lost data? NoYesIn the case of an attack, or corruption of data, you need to have all of your information backed up in order to restore operations and continue business. Wonderful! Check regularly to ensure that your backups are working properly and that all files and information is being protected. Be sure to also have a restoration plan that is regularly tested so that you’re ready to act when an emergency strikes.NextHave your employees had any security or phishing training? *NoYesWe can help you set up training for your employees to be aware and understand what common phishing attacks look like.Great! A well-trained staff is an important piece to defending your organization against attackers.NextDo you have hard drive encryption in place for remote users and on-site laptops? *NoYesFull disk encryption protects the data on your device in the event it is lost or stolen. Without full disk encryption, if the data drive in the computer is removed, the data can be easily read and accessed. When correctly deployed, full disk encryption requires unauthorized users to have both physical access to your device as well as the password in order to decrypt the data on your device.With remote work increasing, make sure that each device that is used by your staff is encrypted to ensure that those devices remain secure.NextFriends don’t let friends get hacked!Forward this Assessment to a fellow business owner or manager to help them ensure they are protected!Name *FirstLastEmail *Phone *Submit