Name Email Contact Number 1. Password Policy Strength What would you rate it on a scale of 1-10 2. Firewall deployment What would you rate it on a scale of 1-10 3. Identification of critical business information What would you rate it on a scale of 1-10 4. Timely backups What would you rate it on a scale of 1-10 5. Knowledge of Active Directory What would you rate it on a scale of 1-10 6. Assessment of your Security Policy What would you rate it on a scale of 1-10 7. Your Cyber Security plans What would you rate it on a scale of 1-10 8. Is your system already exposed & compromised What would you rate it on a scale of 1-10 9. Your plans against ransomware What would you rate it on a scale of 1-10 10. Protection against critical information What would you rate it on a scale of 1-10 11. Post Cyber Security plan if exposed to external threats. What would you rate it on a scale of 1-10 12. Plans for a post ransomware attack What would you rate it on a scale of 1-10 13. Multi-factor authentication (A layered approach to securing data and applications) What would you rate it on a scale of 1-10 14. Vulnerability Scan What would you rate it on a scale of 1-10 15. Patch Management Policy (A process and method used to ensure Hardware & Software) What would you rate it on a scale of 1-10 16. Network Monitoring System What would you rate it on a scale of 1-10 17. Antivirus What would you rate it on a scale of 1-10