In less than 2 minutes, evaluate your security processes. In less than , evaluate your security processes. Please enable JavaScript in your browser to complete this form.Does your team periodically conduct training on how to identify and avoid phishing emails?YesNoDoes your team periodically conduct training on social engineering scams?YesNoDoes your team periodically conduct training on how to remain secure while working remotely?YesNoHave you conducted a simulated phishing email attack on your users, to determine how at-risk your organization is to phishing attacks?YesNoDoes your endpoint security solution include specific features to block and protect against Cryptolocker-type attacks?YesNoAre you certain that all data for your organization is stored in at least 3 different devices, in at least 2 different geographic locations?YesNoDo you have a tested and updated Disaster Recovery and Business Continuity Plan to ensure your organization knows what the plan is in the case of a major security breach or natural disaster?YesNoHow would you rate yourself? *Rate 1 out of 5Rate 2 out of 5Rate 3 out of 5Rate 4 out of 5Rate 5 out of 5Sure, we can give you a rating, but it's time for a gut check. If 1 star is "How are we not hacked already?" and 5 stars is "I'm confident that we've got this", how do you think you're doing?Let's talk about how you're doing. We'll give you a call at your convenience. What's your name? *Your email address? *The best time to contact you? *DateTimeAnd the best number to call? *PhoneSubmit