Skip to content
Support:
877-574-4766
Sales:
832-910-9222
Home
Services
Managed IT Services
Cloud Based Services
Cybersecurity & Compliance
Outsourced IT Services
Business Intelligence and Automation
Windows (Azure) Virtual Desktop
CMMC Compliance
Who We Are
Locations
Albuquerque
Bellaire
Grand Junction
Houston
Humble
Katy
Missouri city
Phoenix
Richmond
Rosenberg
San Antonio
Stafford
Sugar Land
The Woodlands
Tomball
Westchase
Events
Blog
Submit a Ticket
Contact Sales
Discover How Secure Your IT Systems Are
Check for true. Uncheck for false.
Click submit to get your results.
Basic Network Security
We have someone in charge of our network security and they have IT-related experience.
We currently have a process to review, test and implement new technology solutions
Documentation
There are measures in place that control who is able to access our data
We have one or multiple trusted people who have access and this access level is documented
This information is secure or locked away.
User Access
There are measures in place that control who is able to access our data
There is an administrator who manages access control
There is a record of who can access the data and a log to track the user
There are users outside of our internal staff that will have access to client data
Email
We are using external Spam and Virus Filtering
We have confirmed our MX Records, SPF Records and Server Identity are setup properly
We are scanning for viruses inside our mail server database
We have a written policy for transmission of client data
We are leveraging encrypted email to communicate outside of your organization
Bring Your Own Device (BYOD)
We have a policy or software to manage use of mobile devices.
There is a policy to remove firm data if an employee’s device is lost or the employee is terminated.
Networking
We have a hardware firewall and is it under support by the manufacturer.
Our firewall configuration is clean and the operating system up to date.
We have a monitored Intrusion Detection System in place.
We are you using a strong encryption on our wireless networks
Physical Security
We have our servers and data in a physically locked or restricted area.
Only trusted users have access to the servers.
Our laptops are loaded with disk encryption and/or tracking software in the event they are lost or stolen.
The doors to our offices are secure at night and on the weekends.
Data/Files
Where are your backups and how do they get where they are going.
Our files and folder permissions on our servers are secure and setup properly
How do you store and transfer sensitive information with your clients?
Websites
Our website is hosted on a secure server with regular updates and security patching.
We are using SSL certificates for our website to ensure encrypted communication
Operating Systems and Applications
We are enforcing the use of strong passwords and regular password changes enforced.
Our computers are running supported versions of their operating systems.
Our systems are routinely patched we verify everything is working.
We patch all of our applications.
We are running up to date network wide anti-virus & anti-malware software with a valid subscription.
Data Loss & Theft
We have a data theft plan.
We have a policy for notifying our clients of a data breach/loss situation.
Dark Web Scan
We have had a dark web scan performed on our email domain to determine if any accounts are compromised.
Password Vaults
Key employees have access to and use a password management solution to prevent simple passwords.
MFA (Multi Factor Authentication)
Multi Factor Authentication is enabled on all applications and services that allow it.
Endpoint Security
We have more than just standard Antivirus, content filtering, 3rd party application patching, and malware defense.
Event Tracking (SIEM)
There is a security monitoring solution in place for event log tracking and analysis.
Security Awareness Training
We have a training program in place to train our employees about cyber security best practices.
We test our employees on their knowledge of email phishing.
Δ
Home
Services
Managed IT Services
Cloud Based Services
Cybersecurity & Compliance
Outsourced IT Services
Business Intelligence and Automation
Windows (Azure) Virtual Desktop
CMMC Compliance
Who We Are
Locations
Albuquerque
Bellaire
Grand Junction
Houston
Humble
Katy
Missouri city
Phoenix
Richmond
Rosenberg
San Antonio
Stafford
Sugar Land
The Woodlands
Tomball
Westchase
Events
Blog
Submit a Ticket
Contact Sales