Ransomware Protection Assessment Scoring Should You Be Worried About Ransomware?Sangfor has prepared a self-assessment ransomware protection questionnaire for end-users to have a brief overview of their readiness and effectiveness of security controls and security best practices to protect their organizations against ransomware attacks. This questionnaire should take no more than 15 minutes. You are encouraged to select the most appropriate answer for each question in order to have an accurate score.By submitting this survey, you have read and consent to our privacy policy.Thank you for your support!Yours Faithfully,Sangfor Security Team. Company Details Question Title * 1. Your Company Name Question Title * 2. Your Name Question Title * 3. Your Email Address Question Title * 4. Your Phone Number Question Title * 5. Organization Size <200 200 to 500 500 to 1000 1000 to 3000 3000 to 5000 5000 to 10000 > 10000 Question Title * 6. Nature of Business Education Financial Services Government Healthcare / Pharmaceutical Manufacturing / Industrial Retail / Consumer Goods Technology / IT Telecommunications / Media / Entertainment Other (please specify) Question Title * 7. Overall IT Spending Power <50K 50K - 100K 100K - 300K 300K - 500K 500K - 1M 1M - 3M >3M Basic Defense Protection Question Title * 8. Do you have network perimeter defense against ingress or egress traffics, such as a firewall in place? Yes Some No Question Title * 9. Do you have an enterprise / paid / subscription version of antivirus installed on every endpoint, including employees' PCs and servers? Yes Some No Question Title * 10. Does the antivirus signature database update on a regular basis? Yes Some No Internet / Email Access Protection Question Title * 11. Does the internal network, including both employees' PCs and servers, have direct and free access to the Internet without restriction? Yes Some No Question Title * 12. Can the internal network, including both employees' PCs and servers, have access to limitless downloads including executable files, from the Internet? Yes Some No Question Title * 13. Do you have a network security protection mechanism designed to protect against spamming and phishing emails? Yes Some No Question Title * 14. Do you have restrictions on file downloading, including executable files, from email attachments? Yes Some No Backup Availability Assurance Question Title * 15. Do all servers supporting critical business operation have backup servers? Yes Some No Question Title * 16. Do all servers supporting critical business operation have active passive and load balancers to ensure availability? Yes Some No Question Title * 17. Are backup servers located in another network segment, protected by network security protection mechanism? Yes Some No Network Layer Security Question Title * 18. Do you have a separate network for DeMilitarised Zone (DMZ), backend and internal? Yes Some No Question Title * 19. Do you have network segmentation, including VLAN segregation within your organisational network? Yes Some No Question Title * 20. Are you able to monitor possible threats within the internal network? Yes Some No Question Title * 21. Are there any inactive / idle hosts facing externally and exposed to the Internet? Yes Some No Best Practice Security Question Title * 22. Do you patch systems and PCs regularly? Yes Some No Question Title * 23. Do you update installed software and applications to the latest version and patch on a regular basis? Yes Some No Question Title * 24. Are you aware of unauthorized software installed on servers and PCs? Yes Some No Question Title * 25. Do unnecessary ports / services face externally or are they exposed to Internet (ex. 1433/TCP, 3306/TCP)? Yes Some No Question Title * 26. Do remote desktop protocol (RDP) (port 3389/TCP), file sharing protocol (port 22/TCP, 445/TCP), or similar alternatives face externally or are they exposed to Internet? Yes Some No Question Title * 27. Do you perform security assessments like vulnerability assessments on organisational assets on a regular basis? Yes Some No Question Title * 28. Do you have a password complexity policy in place? Yes Some No Monitoring / Threat Intelligence / Response Question Title * 29. Do you have real time threat intelligence on most recent ransomware and threats? Yes Some No Question Title * 30. Are you aware if a security incident occurs? Yes Some No Question Title * 31. Are you aware of internal threats or east-west attacks that occur in the organization? Yes Some No Question Title * 32. Can you determine the kill chain, should a security incident occur? Yes Some No Click here to see your Score !