Evaluate your security posture free of charge by answering 25 questions.
1. Can collaborators access the company network without any restrictions using their own device (smartphone, computer...)?
2. Can collaborators use their company devices (smartphone, computer, etc.) on the company network without any restrictions?
3. Are your collaborators' mobile devices (smartphones, tablets) managed via a device management system?
4. Can your company devices be managed remotely? (e.g. to delete a laptop or a smartphone)
5. Are all the company devices equipped with antivirus software?
6. Do you disable automatic updates on your company devices, in order to first make sure that they do not conflict with your business applications?
7. Are the hard disks of the business devices encrypted?
8. Do you let your employees decide if they want to lock their device automatically or not?
9. Are there specific rules around passwords within your company? (e.g. length, special characters, change every now and then, etc.)
10. Do you allow your collaborators to use a password manager or not?
11. Can your employees log in to crucial sites without using two-factor authentication?
12. Do your employees use SSO (single-sign-on) or Microsoft Hello to log in?
13. Is access to company data restricted on the basis of compliance rules? (Your collaborators must e.g. use a VPN connection to connect to the company network from their home)
14. Is there a clear framework as to who has admin rights and who does not? (For example, regarding access to the Git server, the issues tracker or the cloud environment).
15. Have you set alarms to notify you of anything unusual happening to the company data? (E.g. retrieving company data from an unknown location)
16. Do you log important events regarding collaborators, such as when someone changes rights?
17. Have you established a clear policy on how to restrict access when a colleague is dismissed (exit policy)?
18. Are you confident that your employees will find out for themselves about the dangers of opening attachments or clicking on links in suspicious e-mails?
19. Are your collaborators aware of the risks associated with social engineering or false invoices?
20. Does your company consistently back up crucial data?
21. Do you keep backups in a secure location on your company premises?
22. Did you enable advanced security systems such as intrusion detection or event log managers with built-in data protection?
23. Do you have a roadmap to respond to DDoS attacks, hackers or the failure of a business-critical server?
24. Are you counting on the filters in your employees' individual e-mail clients to work adequately without any e-mail security solutions at company level? (e.g. spam filtering)
25. Is the security of physical access to your corporate office with, for example, a badge system, alarm, etc. less important to you?
Leave us your details and we will contact you for a no-obligation consultation