Technology Solutions for the New Frontier
Home
Services
Physical Security
Unified Communications
Audio Video
Team
Request a Consultation
IT Security Assessment
Please enable JavaScript in your browser to complete this form.
Administration
Person Responsible for Cybersecurity
*
Title
Company Name
*
Company Address
*
Company Phone Number
*
Company Website
*
Where is Website Hosted?
Number of Employees
Number of Locations
IT Staff Onsite?
Yes
No
If IT Services Are Outsourced - Who is Vendor (If Applicable)
MFA Enabled for Devices?
Yes
No
MFA Enabled When Remotely Logging Into Network or Online Services Including Email?
Yes
No
Background Checks on IT Personnel?
Yes
No
Internet Service Provider Information
Internet Service Provider
Types of Circuits/Bandwidth?
Service Level Agreement?
Speed Test Results
Web Proxy?
Yes
No
ISP Content Filtering?
Yes
No
ISP Provide Monitored Security?
Yes
No
Network Information
Guest Wifi?
Yes
No
Guest Wifi Segregated?
Yes
No
Compliance Standards Required?
(NIST, ISO, HIPAA, PCI-DSS, SOC2, SOX, GDPR)
Have You Experienced a Recent Cyber Attack?
Yes
No
SCADA Network?
Yes
No
SCADA Network Information
Most Recent Penetration Test?
Network Gateway
(ex. 192.168.1.1)
Network Subnets
Important Static IPs
Network Modem Manufacturer & Model
Network Router Manufacturer & Model
Network Switch Manufacturer & Model
Wireless Access Point Switch Manufacturer & Model
Hardware Configuration & Management Process
Third-Party Connections to Network?
Yes
No
List Third-Parties Connectioned to Network
Physical Security
Restricted Access to Building?
Yes
No
Restricted Access to Server Room?
Yes
No
Access Control Vendor? (If Appicable)
Camera Manufacturer & Model
NVR/Storage Device Manufacturer & Model
Video Footage Storage Location?
Cloud Backup of Video Footage?
Yes
No
Device Information
Number of Computers on the Network
(Desktop PCs, Laptops, Point-of-Sale, etc.)
Computer Manufacturer & Model
Operating System Used
Hard Drive Space Remaining
Memory Size
(RAM Available)
List Installed Software on Computer Devices
List SaaS Applications Utilized by Staff
Single Sign-On Enabled?
Yes
No
Single Sign-On Vendor
Zero Trust Enforced?
Yes
No
Zero Trust Vendor
Employees Bring Their Own Devices to Workplace?
Yes
No
Regulated Administrator Accounts
Important User Accounts
Allow Accounts That Are Shared by Multiple Users?
Yes
No
Password Manager?
Yes
No
Password Manager Vendor
IT Infrastructure/Application/Computer Patching Schedule
Employees with Remote Access?
(Remote with VPN or Software)
Password Complexity Rules (at least 16 characters)?
Yes
No
Password Management Process
New Hardware Configuration Process?
Asset Management Process?
Microsoft Licensing?
Server Management
Current MSP?
Number of Servers
Server Manufacturer & Model
Microsoft Server Licensing
Server Roles & Purpose
Current Server Operating System
Server IPs
Virtual Machines?
(Microsoft Hyper-V, VMware)
Domain Information
(DNS, DHCP, User Authorization & Authentication)
Acceptable Downtime for Servers?
Servers Under Warranty?
Yes
No
Endpoint Security
Active Firewall?
Yes
No
If so, Manufacturer and Model Number of Current Firewall
Additional Firewall Notes
VPN Information (If Applicable)
Current Antivirus/Endpoint Protection Solution
(Endpoint Protection)
Is Encryption Enabled?
Yes
No
MDR Subscription Active?
Yes
No
(Managed Detection Response)
Additional Antivirus Notes
Backup & Disaster Recovery
Current Backup Vendor Solution for Critical Data
Backup Schedule for Critical Data & Systems
Up-To-Date Device Images?
Yes
No
Recent Backup Restore?
Yes
No
Storage Device Type
(Network Attached Storage Device, External Hard Drive, Cloud Storage)
Storage Device Manufacturer & Model
Available Storage Space?
Off-Site Backups?
Yes
No
Backups of Cloud Applications?
Yes
No
Data Encryption Type
Describe Most Important Digital Assets & Client Sensitive Information
Storage Solution
Use File Sharing Service?
Yes
No
Who Manages File Sharing Service?
Active File Server?
Yes
No
File Server Manufacturer & Model (copy)
File Server Storage Space
File Server RAID Format
Domain Shares
Advanced Email Threat Protection
MFA Enabled for Email?
Yes
No
On-Site Email Server?
Yes
No
Current Email Host
Advanced Email Threat Protection?
Yes
No
Advanced Email Threat Protection Vendor
Security Awareness Training for Staff Members?
Yes
No
Security Awareness Vendor
Backups of O365/GSuite Email? (If Applicable)
Yes
No
Review Mailbox Forwards
Any Issues Relating to Spam Emails?
Web Security
Active Cloud Applications
Current Web Content Filtering
Web Filtering Vendor
Enforcement Method
(Software, VM, Domain, etc)
Written Information Security and Privacy Policies in Place?
Yes
No
Web Awareness Training for Staff Members?
Yes
No
Company Web Policies
Administrator Policy Training
Voice Service
Phone Manufacturer & Model Number
Total Number of Phones
Total Number of Phone Lines
PBX/VoIP Provider
Call Management System
Additional Client Details
Business Continuity & Disaster Recovery Plan?
Yes
No
Tested Business Continuity & Disaster Recovery Plan?
Yes
No
Security Incident Plan?
Yes
No
Procedure in Place to Verify the Authenticity of a Payment or Funds Transfer Request Made by an Internal Company Source/Vendor or 3rd Party?
Yes
No
Do Any Business With Cryptocurrency Related Industries, Including Mining, Exchanges, ICO's or Storage
Yes
No
Cyber Insurance Policy in Force?
Yes
No
List Email Addresses Contained on Dark Web (ID Agent)
List Results of Internal Vulnerability Scan
Issues With Current Network (If Applicable)
Describe Current IT Initiatives
Desired Outcomes Working with TechnologyWest
Submit