// We Check Your Protection
Do you want to protect your business from
online security threats?
Complete the checklist to find out your level of protection!
Start a Cyber Health Check now!
People / Employees
Do you provide employee cyber awareness training at least monthly?
Are regular phishing testing campaigns performed to test employees knowledge?
Is a password management system enforced (no passwords stored in internet browsers) and training provided?
Do you have Multifactor Authentication for cloud programs enabled and enforced? *
Do you enable known programs only (also referred to as application whitelisting)? *
Are employees using computers as “standard users” rather than local administrator users? *
Do you block employees from downloading and running files or programs from the internet?
Do you have SPAM protection on all mailboxes?
Cyber Governance for all employees and contractors
Do you have an Acceptable Cyber Use Policy?
Is a Data Breach policy and response plan in place?
Is an IT asset management register and policy implemented?
Do WFH employees have a Remote working ICT policy?
Have employees signed an Email Policy?
Do you have a Lost or stolen device and password procedure?
Is there an established Employee / device onboarding and offboarding process?
Do you receive ongoing cyber security advice?
Company owned computers (and mobile devices)
Do you use managed and monitored Next Generation Antivirus (“managed” means someone checks that all computers are protected and up to date)?
Do you filter websites based on categories (i.e. by blocking malicious or inappropriate websites)
Are Windows / MacOS updates automated and enforced? *
Are program updated automated and enforced (i.e. MS Office or Adobe Acrobat)? *
Are Microsoft Macros blocked or secured? *
Are browser and programs hardened (i.e. disable Flash and JavaScript)? *
Is Multifactor Authentication for the computer mandatory? *
Are your computer hard drives encrypted to avoid data loss?
Is the use of USB storage devices restricted or limited (i.e. thumb drives and external hard drives)?
Can you remote wipe or remote block computers or devices in cases of loss / theft or abuse?
Mitigation
Do you run daily backups with at least 90 days retention? *
Is there an external or online replication copy of the backup that is automated?
Are you testing file recovery every 3 months to ensure backups are indeed working?
Do you have a Backup and Disaster Recovery plan or procedure?
Send
Jam Cyber |
Contact Us |
Linkedin
Youtube
Have questions? Search our knowledgebase.