Existing Hardware & Software Information While optional, it's important to provide as much detail as possible, and remember you can always schedule a call with us so we can walk through this together via https://calendar.wrld.tech
Breifly describe your IT infrastructure as it exists and how it is maintained Do you have server(s) on site? Do you have an 'IT guy' or 'the owners son that helps out'? Any and all details helps us get the best picture of the state of your IT systems. There is no wrong answer.
What are the current antivirus and malware protection systems in place? Select all that apply
Norton by Symantec McAfee Endpoint Security Trend Micro OfficeScan Kaspersky Endpoint Security Sophos Endpoint Protection ESET Endpoint Security Bitdefender GravityZone Avast Business Antivirus Malwarebytes Endpoint Protection Webroot SecureAnywhere Business Endpoint Protection F-Secure Endpoint Protection CylancePROTECT CrowdStrike Falcon Endpoint Protection SentinelOne Endpoint Protection I don't know / I'm not sure
What is the current backup and disaster recovery solution in place? Select all that apply
Acronis Cyber Backup Veeam Backup and Replication Veritas Backup Exec Commvault Backup and Recovery Rubrik Cloud Data Management Zerto IT Resilience Platform Datto Backupify Carbonite Backup Unitrends Backup Nakivo Backup and Replication Cohesity DataProtect Code42 CrashPlan Asigra Cloud Backup IBM Spectrum Protect Arcserve Unified Data Protection I don't know / I'm not sure
Indicate which of the following IT security policies and procedures your organization currently has in place Select all that apply
Password policies for employees Data backup and recovery procedures Network security measures, such as firewalls and intrusion detection systems Employee training on security best practices Access controls, such as permissions and privileges for different users Incident response plans, including steps to take in case of a security breach Security audits and assessments to identify vulnerabilities and gaps in security Physical security measures, such as access controls to data centers or other sensitive areas Software patch management procedures to ensure systems are up to date and secure Encryption policies for sensitive data in transit and at rest Mobile device management policies for smartphones and tablets used by employees Vendor management policies to ensure third-party providers have adequate security measures in place Disaster recovery and business continuity plans to ensure operations can continue in case of a major disruption or disaster.
Select any specific compliance requirements your company has to comply with Select all that apply
(HIPAA) Health Insurance Portability and Accountability Act (GLBA) The Gramm-Leach-Bliley Act (OSHA) Occupational Safety and Health Administration regulations for workplace safety and health. (NIST) National Institute of Standards and Technology Special Publication (SP) 800-171 (PCI DSS) Payment Card Industry Data Security Standard (GDPR) General Data Protection Regulation for companies that do business with EU citizens (SOX) Sarbanes-Oxley Act (SOC/2) Service Organization Control (SOC) 2 (CCPA) California Consumer Privacy Act (FERPA) Family Educational Rights and Privacy Act (FISMA) Federal Information Security Modernization Act (FedRAMP) Federal Risk and Authorization Management Program (NERC) North American Electric Reliability Corporation (CIP) Critical Infrastructure Protection (CIP) standards I don't know / I'm not sure
Select any network, security and other protocals currently in place: Select all that apply
Intrusion Detection System (IDS) Intrusion Prevention System (IPS) Virtual Private Network (VPN) gateway Content Filter Unified Threat Management (UTM) appliance Web Application Firewall (WAF) Data Loss Prevention (DLP) system Network Access Control (NAC) system Security Information and Event Management (SIEM) system Network Behavior Analysis (NBA) system Network Anomaly Detection (NAD) system Proxy server Email security gateway Voice over IP (VoIP) gateway I don't know / I'm not sure
What is the current hardware inventory? List to the best of your knowledge how many desktops, laptops, work phones, printers, copiers, and any other hardware that needs IT support.