CMMC Compliance and Cybersecurity
503-726-5933
Licensing
Microsoft Licensing Options
Software Audits
Microsoft 365 Comparison Chart
Cybersecurity
Security Plans
Azure Sentinel
Security Solutions
KAMIND IT SOC (Security Operations Center)
Compliance In The Cloud
Cyber Breach Insurance
CMMC Implementation
HIPAA Compliance Checklist
Microsoft 365 GCC High Licensing
NIST 800-171
Services
Contact Us
Support Services
New System Request
KAMIND IT Projects
Microsoft Azure
SQL
Microsoft Teams
Microsoft Power BI
Azure Virtual Desktop
Windows Autopilot
Windows Devices as a Service
Office 365 Migration
About Us
KAMIND Story
KAMIND Core Values
Careers
Clients We Serve
Team Inclusion
About Us – Media Focus
We Wrote The Book
Resources
We Wrote The Book
Training
Client Case Studies
KAMIND Blog
Newsletter Archives
Clients
Payment Portal
Licensing Portal
Guard+ (Commercial)
Guard+ (Government)
503-726-5933
Are You Protected From a Cyber Attack Questionnaire
Instagram
This field is for validation purposes and should be left unchanged.
Company Name
*
Work Email
*
Contact Name
*
Work Phone
*
It is important to establish a baseline and close existing vulnerabilities. When was your last Security Assessment?
*
MM slash DD slash YYYY
Secure your email. Most attacks originate in your email. Do you have a current service designed to reduce spam emails?
*
Yes
No
Apply security passwords on your network. When was the last time passwords were updated or confirmed?
*
MM slash DD slash YYYY
Train your users OFTEN. Teach them about data security, email attacks, and your policies and procedures. Has your team gone though security trainings and procedures?
*
Yes
No
Protect your computers and data from malware, viruses, and cyber attacks with advanced endpoint security. Do you have software to combat file-less and script-based threats and able to rollback a ransomware attack?
*
Yes
No
Utilize Multi-Factor Authentication whenever you can, including on your network, banking, websites and even social media. Does your organization utilize Multi-Factor Authentication?
*
Yes
No
Keep Microsoft, Adobe, and Java products updated for better security. Do you have a process in place that automates crucial updates to protect against the latest known attacks?
*
Yes
No
Knowing in real-time what passwords and accounts have been posted on the Dark Web will allow you to be proactive in preventing a data breach. Do you or your organization currently utilize dark web scanning services?
*
Yes
No
SIEM uses big data engines to review all event and security logs from all covered devices. Does your organization currently utilize SIEM/Log Management?
*
Yes
No
Internet security is a race against time. Cloud based security detects web and email threats as they emerge on the internet. Does your organization have Web Gateway Security currently in place?
*
Yes
No
Today’s cybercriminals attempt to steal data or access your network by way of your employee’s phones and tablets. Does your organization have MDM procedures currently in place?
*
Yes
No
Turn on Intrusion Detection and Intrusion Preventive features & send the log files to a managed SIEM. Does your current team or IT Provider understand how to accomplish this?
*
Yes
No
The goal is to make sure to encrypt files at rest, in motion and especially on mobile devices. Is your organization currently encrypting files?
*
Yes
No
Backup Local. Backup to the cloud. Have a backup for each month of the year. Does your organization have a backup system in place?
*
Yes
No
If so, when was the date of your last backup
*
Δ