Step 1 of 14 0% 10 minutes. 10 questions. See if your company is ready for a ransomware attack. Let's Get StartedFirst, tell us a little bit about you.Name(Required) First Last Email(Required) Network EnvironmentGreat to meet you! Before we jump into the assessment, help us understand a few basics about your network environment.Where are your employees located?(Required) On-site Remote Hybrid Network EnvironmentWhat devices do they use to access the network?(Required) Company-provided devices Personal devices (BYOD) Both Proactive Data ProtectionGreat! Let’s start the assessment with a few questions about your approach to protecting your network from ransomware attacks.How do you currently manage ransomware prevention?(Required) Managed Services In-House Management We do not focus on ransomware prevention Proactive Data ProtectionWe protect our network with an up-to-date, fully patched enterprise firewall.(Required) Agree Unsure Disagree Proactive Data ProtectionWhether they are on-site or working remotely, employees are protected at the DNS level from accessing malicious websites.(Required) Agree Unsure Disagree Proactive Data ProtectionWe have an established security policy that includes user training on how to avoid common attacks (e.g., phishing, social engineering, etc.)(Required) Agree Unsure Disagree Proactive Data ProtectionOur users access the internet through a secure gateway that scrubs and monitors all incoming and outgoing traffic.(Required) Agree Unsure Disagree Response ReadinessWe’re almost done! Just a few more questions about your response and recovery plans.We have a backup strategy in place that follows the 3-2-1 rule (3 backup copies, at least 2 types of storage media, at least 1 stored offsite).(Required) Agree Unsure Disagree Response ReadinessWe use immutable backups to secure our backup data to ensure they cannot be overwritten by ransomware.(Required) Agree Unsure Disagree Response ReadinessWe have an insider/breach protection solution that is off-site and prevents hackers or malicious insiders from accessing and/or deleting our backup data.(Required) Agree Unsure Disagree Response ReadinessWe have a disaster recovery site that we can failover to in the event of a ransomware attack or breach.(Required) Agree Unsure Disagree Response ReadinessOur DR solution is regularly tested and our IT staff is trained on how to properly respond to a ransomware attack.(Required) Agree Unsure Disagree