• Home
  • Services
    • Managed Services
    • Consulting
    • Project Management
    • Virtual CIO
  • Offerings
    • Backup
    • Helpdesk
    • Phones
  • Content
    • All Articles
    • Managing IT
    • Security
    • Search
    • Our Favorite Tools
    • Our Favorite Articles
    • SNMP Monitoring
  • Resources
    • Get Help!
    • Helpdesk
    • eSecure Backup
    • Remote Support
    • Customer
    • Services Agreement
  • About
    • Contact Form
    • Photo's

Capstan Services

  • Home
  • Services
    • Managed Services
    • Consulting
    • Project Management
    • Virtual CIO
  • Offerings
    • Backup
    • Helpdesk
    • Phones
  • Content
    • All Articles
    • Managing IT
    • Security
    • Search
    • Our Favorite Tools
    • Our Favorite Articles
    • SNMP Monitoring
  • Resources
    • Get Help!
    • Helpdesk
    • eSecure Backup
    • Remote Support
    • Customer
    • Services Agreement
  • About
    • Contact Form
    • Photo's
1. Do you use password management software that is not part of a web browser?

1. Do you use password management software that is not part of a web browser?

2. Can you say that you have never asked an IT provider to make an exception to an existing process in order to enable productivity (business or employee)?

2. Can you say that you have never asked an IT provider to make an exception to an existing process in order to enable productivity (business or employee)?

3. Does your company have a published security policy that all employee’s are trained on at least yearly?

3. Does your company have a published security policy that all employee’s are trained on at least yearly?

4. Have you attended a training session on security in the last 12 months?

4. Have you attended a training session on security in the last 12 months?

5. Are all your passwords unique? ( i.e. no case where you use the same password in more than one place)

5. Are all your passwords unique? ( i.e. no case where you use the same password in more than one place)

7. Does your business have a plan for when there is a security event?

7. Does your business have a plan for when there is a security event?

8. Do you see security and profitability as going hand in hand?

8. Do you see security and profitability as going hand in hand?

9. Does your business have a plan to make public notification of a security event?

9. Does your business have a plan to make public notification of a security event?

10. Are all your passwords computer generated?

10. Are all your passwords computer generated?

11. Do you know who is monitoring your systems for security and reliability?

11. Do you know who is monitoring your systems for security and reliability?

14. Is there an IT professional engaged at the top level of your business? (i.e. C-Level or Board of Directors)

14. Is there an IT professional engaged at the top level of your business? (i.e. C-Level or Board of Directors)

15. Would you be willing to shut down your business operations in order to secure a security breach?

15. Would you be willing to shut down your business operations in order to secure a security breach?

1 2 3 4 5 6 7 8 9 10 11 12
1. Do you use password management software that is not part of a web browser?
2. Can you say that you have never asked an IT provider to make an exception to an existing process in order to enable productivity (business or employee)?
3. Does your company have a published security policy that all employee’s are trained on at least yearly?
4. Have you attended a training session on security in the last 12 months?
5. Are all your passwords unique? ( i.e. no case where you use the same password in more than one place)
7. Does your business have a plan for when there is a security event?
8. Do you see security and profitability as going hand in hand?
9. Does your business have a plan to make public notification of a security event?
10. Are all your passwords computer generated?
11. Do you know who is monitoring your systems for security and reliability?
14. Is there an IT professional engaged at the top level of your business? (i.e. C-Level or Board of Directors)
15. Would you be willing to shut down your business operations in order to secure a security breach?
Top
  • Project Management
  • Virtual CIO
  • Consulting
  • Managed Services
  • Backup