security-checklistWith the ever increasing reliance on technology that businesses are seeing – especially with the rise of mobility and the ability to work from anywhere – the world of IT security is also rapidly changing. Every business is at risk of some type of breach.

Ransomware is just one of the growing and popular types of malware. This malicious software encrypts your data without your knowledge, preventing you from accessing your hijacked data unless you pay their hefty fees. In a June 2015 article published by ComputerWeekly.com, ransomware attacks have cost US businesses $18m in the past year alone, not including indirect costs and unreported attacks.

Your data is your business! Take our Ransomware Awareness Quiz to make sure you’re steering clear of the consequences of getting security wrong.

  1. Are you confident that you are backing up ALL of your company’s data?
    • YES
    • NO
    • I DON’T KNOW
  1. Are you confident your backups are protected from infection?
    • YES
    • NO
    • I DON’T KNOW
  1. Are you 100% confident that, if your system was infected, you will be able to get all your data back?
    • YES
    • NO
    • I DON’T KNOW
  1. If your system was entirely encrypted do you know how long it will take to restore your data?
    • YES
    • NO
    • I DON’T KNOW
  1. Is your data backed up at least once per hour?
    • YES
    • NO
    • I DON’T KNOW
  1. Does your staff know how to detect phishing emails?
    • YES
    • NO
    • I DON’T KNOW
  1. Do you have up-to-date security subscriptions to detect suspicious activity on your network?
    • YES
    • NO
    • I DON’T KNOW
  1. Have you performed a test restore within the last month?
    • YES
    • NO
    • I DON’T KNOW
  1. Is the number one data breach phishing e-mail?
    • YES
    • NO
    • I DON’T KNOW
  1. Do you have a disaster recovery plan that you reviewed within the last year?
    • YES
    • NO
    • I DON’T KNOW

RESULTS:

The Security Rockstar: (If you have answered predominately ‘YES’)

You definitely know your stuff when it comes to ransomware and security. You check your back-ups frequently and keep up to date with trends in cyber security. You may be working with an IT partner, but this is a good time to review the above list with your IT provider to ensure you are up to date. If you’re doing IT services and security in-house, then great work! It’s still worthwhile to explore opportunities to work with an IT partner alongside your team to save your company time and money. A trusted IT provider can enable you to focus on core business initiatives, increase productivity, and control costs.

The Security Fan: (If you have answered predominately ‘NO’)

You are somewhat knowledgeable about what is happening in the area of cyber security, but when it comes to getting “up on stage” yourself (like The Security Rockstar), you’re gun-shy and inexperienced. You may know the direction your company needs to take to prevent any security infiltration, and might even be aware of the potential gaps within your company. But you need help from a trusted partner to help you better succeed in your security endeavors. An IT provider can facilitate the process of getting your company protected immediately and efficiently. The right IT partner can enable you to support multiple levels of security, run good network security with intrusion prevention, provide gateway level antivirus, and give you overall management of tech systems.

The Security Spectator: (If you have answered predominately ‘I don’t know’)

You might have a little knowledge about security, but aren’t sure how to gauge your company’s level of security to make sure it’s totally buttoned up. In fact, your lack of knowledge might lead you to ignore your security issues altogether. You are the perfect match to work with an IT provider that can guide you through each step of securing your most valuable assets. By beginning with a security assessment from a trusted IT consultant you can get on the right path to protecting your business and your brand.