Name

    Email

    Contact Number

    1. Password Policy Strength
    What would you rate it on a scale of 1-10


    2. Firewall deployment
    What would you rate it on a scale of 1-10


    3. Identification of critical business information
    What would you rate it on a scale of 1-10


    4. Timely backups
    What would you rate it on a scale of 1-10


    5. Knowledge of Active Directory
    What would you rate it on a scale of 1-10


    6. Assessment of your Security Policy
    What would you rate it on a scale of 1-10


    7. Your Cyber Security plans
    What would you rate it on a scale of 1-10


    8. Is your system already exposed & compromised
    What would you rate it on a scale of 1-10


    9. Your plans against ransomware
    What would you rate it on a scale of 1-10


    10. Protection against critical information
    What would you rate it on a scale of 1-10


    11. Post Cyber Security plan if exposed to external threats.
    What would you rate it on a scale of 1-10

    12. Plans for a post ransomware attack
    What would you rate it on a scale of 1-10

    13. Multi-factor authentication (A layered approach to securing data and applications)
    What would you rate it on a scale of 1-10

    14. Vulnerability Scan
    What would you rate it on a scale of 1-10

    15. Patch Management Policy (A process and method used to ensure Hardware & Software)
    What would you rate it on a scale of 1-10

    16. Network Monitoring System
    What would you rate it on a scale of 1-10

    17. Antivirus
    What would you rate it on a scale of 1-10