Employee errors are the #1 source of data breaches. Indicate how well informed, educated, and aware your employees are in the following areas.
HARDWARE & SOFTWARE
Desktop computers, devices, accessories, servers and multiple software programs used to conduct business all have their own security requirements. Where do you rank?
Remote access to your networks from wireless devices, such as smartphones, tablets, and personal laptops, can create pathways for security threats. How are you doing with the following endpoint security measures?
Modern printers and copiers are connected to networks and have the ability to email, scan, fax, store data, and yes – even print! They need to be protected just as much as computers. How does your organisation rate?
We’ve outlined a detailed plan in the event a disruption occurs. The plan includes clearly defined processes, and it identifies who will take certain actions.