top of page
Home
Services
LOGISTICS & WAREHOUSE
Industries
About
Contact Us
Blog
More
Use tab to navigate through the menu items.
Company name
*
First name
*
Last name
*
Do you have cybersecurity policies and training in place, including employee education, password requirements, and remote work guidelines?
*
We have a formal cybersecurity policy
Employees receive regular cybersecurity training
We enforce password complexity and expiration policies
We have a remote work security policy
None of the above
Do you have network security measures in place such as firewalls, intrusion detection/prevention systems, secured Wi-Fi, and port/service restrictions?
*
We use a firewall to protect our internal network
We have intrusion detection or prevention systems in place
Our Wi-Fi network is secured and segmented from internal systems
We regularly review and restrict open ports and services
None of the above
Are your devices protected with antivirus software, regular updates, and mobile device security measures like encryption or MDM?
*
All devices have antivirus and anti-malware protection
We apply system updates and patches regularly
We enforce mobile device security (e.g., MDM, encryption)
None of the above
Do you have data protection practices in place, such as encryption, regular backups, secure storage, and data disposal policies?
*
We encrypt sensitive data at rest and in transit
We perform regular backups and test them periodically
Our backups are stored securely (on-site, cloud, or hybrid)
We follow a policy for secure data disposal
None of the above
Do you manage user access securely with role-based permissions, admin controls, MFA, and timely account deactivation?
We grant user access based on roles and responsibilities
Admin privileges are limited and monitored
We use multi-factor authentication (MFA)
We promptly deactivate accounts for inactive or former employees
None of the above
Do you have incident response and monitoring practices in place, including logging, testing, and recent incident tracking?
*
We have a documented incident response plan
Logs and security events are monitored regularly
We’ve conducted recent penetration tests or vulnerability scans
We’ve experienced a cybersecurity incident in the past 12 months
None of the above
Do you follow compliance and risk management practices, such as adhering to frameworks, performing risk assessments, and reviewing third-party security?
*
We are subject to compliance frameworks (e.g., HIPAA, GDPR, CMMC)
We’ve completed a cybersecurity risk assessment in the past year
We review the cybersecurity practices of vendors and third-party partners
None of the above
Are you planning changes to your IT environment, facing specific cybersecurity concerns, or interested in expert guidance on improving your security posture?
We have upcoming changes to our IT infrastructure or operations
We have specific concerns about areas of our cybersecurity strategy
We’re interested in help creating a security roadmap or improvement plan
None of the above
Submit
bottom of page