Skip to form
IT-SVC-LI-Header-Biz
ransomware-cyber-image

Ransomware Protection + Backup Checklist

 

Take our quick questionnaire to see if your business is prepared for a potential malware threat. These preventitive measures will ensure a healthy backup, limit loss, and shorten downtimes whenever a recovery is needed. You can never be too prepared!

 

Once you have answered all of the questions below, we will email you with the results of your protection status along with some suggestions on how you can make your system less vulnerable.

When doing your backup, what devices do you typically include?*
It is best practice to have as much data as possible backed up to minizine data loss, downtime, and over all damage. This includes backing up the configurations of any and all network appliances, for example a firewall.
How many redundant copies of your data backups do you keep?*
It is important to have redundant copies stored to prevent a complete loss of data if a security breach occurs.
How many different locations do you back your data up to?*
If there is an attack, it helps mitigate data loss, downtime, and recovery to store the same data in multiple locations.
Do you keep a backup set offsite?*
Isolating your data off-site is an integral step in minimizing loss and damage in the event of a breach.
How often do you do a data backup?*
The only way to protect a business against valuable data loss is by regular, daily backups. 
How are your backups scanned and protected by cybersecurity software?*
Cybersecurity software, such as Acronis Cyber Protect, are additional preventitive measures that protect your backup copies and monitor potential threats.
Is your data encrypted?*
Encryption is an added layer of protection so that if your data is unfortunately lost, it ensures that no one is able to read the data that is compromised.
Do you have a data storage policy detailing where everyone should save data to be backed up?*
Implementing a company-wide data storage policy ensures that all content is being archived, stored, or saved to the designated company storage location.
Do you have a centralized backup reporting system?*
It is essential to have a routine reporting system in place to ensure that your backups are in good health.
Do you regularly update/patch firmware and software? (Workstations, Servers, Network Appliances)*
It is crucial to maintain software security updates to ensure system resilience against intrusion.
Do you provide employee training on phishing, suspicious emails, and other malicious activities?*
A vast majority of ransomware attacks are the result of social engineering attempts carried out against untrained employees.
Enter your email address below.