Skip to content
  • About Nathan
  • Speaking and Events
  • Podcast and Media
  • Resources
  • Press
  • About Nathan
  • Speaking and Events
  • Podcast and Media
  • Resources
  • Press
Book Nathan
  • About Nathan
  • Speaking and Events
  • Podcast and Media
  • Resources
  • Press
  • About Nathan
  • Speaking and Events
  • Podcast and Media
  • Resources
  • Press
Book Nathan
  • About Nathan
  • Speaking and Events
  • Podcast and Media
  • Resources
  • Press
  • About Nathan
  • Speaking and Events
  • Podcast and Media
  • Resources
  • Press
Book Nathan

Digital Self Assessment

Time Left:
00
:
00
:
00
 
 
Time expired. Sorry, you will not be able to continue with this quiz. Please opt-in to see the result.
HRS
MIN
SEC
SEC
Total Time
[SQBTimeSpent]
0
HRS
0
MIN
0
SEC
CEO's Digital Self-Assessment

Chapter 1 of "The CEO's Digital Survival Guide" contains a quiz to help you understand where your company is on your journey to mastery of digital technology in your business. The assessment is divided up into 5 sections: Infrastructure, CyberSecurity, Compliance, Backup and Disaster Recovery, Business Strategy, and Cloud. This assessment has a total score between 30 and 90. You will rank each question between 1 and 3. 1 – You don’t understand the question, or you have not implemented it in any way in your company. 2 – You have a general understanding of the question and have attempted to implement it in your company, but you know it is not working 100% for you. 3 – You understand the information in the question, and you know that it is fully implemented across your organization.

Quiz Start
Category Name:Infrastructure
Category Name:Cybersecurity
Category Name:Compliance
Category Name:Backup and Disaster Recovery
Category Name:Business Strategy
Category Name:Cloud
1%

1/30

We maintain an inventory of all workstations, servers and network equipment and we have implemented a sustainable hardware refresh cycle.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

2/30

We utilize an incident ticketing system, and we provide our management team with regular response and resolution time reports, and whether the results of those reports are meeting the organization's expectations.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

3/30

Our wireless network prevents guests from accessing our internal network and employees have unique usernames and passwords assigned for wireless access.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

4/30

Our office locations utilize redundant internet service provider connections, and our firewall or router automatically swaps connections in the event of an outage.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

5/30

Our servers and network equipment are protected with uninterruptible power supply units that are replaced every 3 years, are in a physically secure location, and have separate HVAC systems.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

6/30

I am confident that we have the proper cybersecurity software deployed to protect personal and corporate data from attacks such as phishing and ransomware, including any remote devices that are used to access critical infrastructure and data.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

7/30

We engage with all organization employees and properly train them to identify ransomware, phishing and social engineering attacks coming from email, text message and web sites.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

8/30

All organization IT systems and devices that contain PII or sensitive company information are encrypted to protect against loss or theft.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

9/30

We use single sign on and two-factor authentication across all critical lines of business applications such as Office 365, our ERP system and remote access.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

10/30

The level of cybersecurity insurance carried by our business is adequate to protect our organization and our clients from financial loss.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

11/30

We apply regular server and workstation security patches and updates across our technology infrastructure.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

12/30

We have a properly segmented corporate network (meaning workstations, servers, phones and guests are kept in separate logical networks).
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

13/30

We perform a regular network vulnerability scan and have archived all historical scan data for reporting and compliance purposes.
Click to customize
No implementation
Some Implementation
Fully Implemented
Next

14/30

We have a written information security policy (WISP) that has been agreed to by all employees.
Click to customize
No implementation
Some implementation
Fully implemented
Next

15/30

We are meeting all state and federal compliance requirements such as HIPAA, PCI DSS, FINRA and all federal and state PII Rules and we are confident we would pass an audit.
Click to customize
No implementation
Some implementation
Fully implemented
Next

16/30

We proactively monitor our server and cloud infrastructure for failures and performance issues so that business affecting problems can be prevented.
Click to customize
No implementation
Some implementation
Fully implemented
Next

17/30

We regularly review our backup strategy, and we adhere to a documented process for backup frequency, retention and location.
Click to customize
No implementation
Some implementation
Fully implemented
Next

18/30

We perform regular backup recovery testing, and we have a clear time objective for restoring critical systems and data.
Click to customize
No implementation
Some implementation
Fuly implemented
Next

19/30

Our management team understands and has agreed to the Recovery Time Objective (RTO) and Recovery Point Objective (RPO) for backup and disaster recovery and both are monitored and tested regularly.
Click to customize
No implementation
Some implementation
Fully implemented
Next

20/30

We have a well-defined disaster response team with clearly defined roles, responsibilities and communication protocols.
Click to customize
No implementation
Some implementation
Fully implemented
Next

21/30

The organization's management team views technology as an investment, not a cost and they agree to implement best practices when recommended by the IT team.
Click to customize
No implementation
Some implementation
Fully implemented
Next

22/30

We perform a regular technical alignment assessment to identify areas of our technology infrastructure that do not meet best practices.
Click to customize
No implementation
Some implementation
Fully implemented
Next

23/30

We meet regularly as a team to assess risk, discuss strategy and perform IT budget planning for our organization.
Click to customize
No implementation
Some implementation
Fully implemented
Next

24/30

We have a clear process for making IT related decisions in our organization, a project plan is agreed upon before implementation and communication within our organization is clear and consistent.
Click to customize
No implementation
Some implementation
Fully implemented
Next

25/30

We consistently bring advances in technology to the attention of our management team, which increase employee productivity and gives us an edge over our competitors.
Click to customize
No implementation
Some implementation
Fully implemented
Next

26/30

We utilize a secure cloud-based email solution like Microsoft 365.
1
Insert Video
Enter any additional information about the quiz
Click to customize
No implementation
Some implementation
Fully implemented
Next

27/30

Our cloud services are configured according to the service provider’s recommended best practices.
1
Insert Video
Enter any additional information about the quiz
Click to customize
No implementation
Some implementation
Fully implemented
Next

28/30

Our cloud-based email and file services are configured with data loss prevention policies and alerting to prevent data breaches.
1
Insert Video
Enter any additional information about the quiz
Click to customize
No implementation
Some implementation
Fully implemented
Next

29/30

Users have the ability to work wherever they are and whenever they want to work.  The connection to the company's infrastructure is secure.  The infrastructure can grow and shrink as business needs change.
1
Insert Video
Enter any additional information about the quiz
Click to customize
No implementation
Some implementation
Fully implemented
Next

30/30

We utilize a 24/7 SOC that monitors and alerts on our network, cloud services and critical data systems.
1
Insert Video
Enter any additional information about the quiz
Click to customize
No implementation
Some implementation
Fully implemented
Next
Next
123456
%%QUESTIONANSWERS%%
Skip Opt-in
Insert Video
Almost there...
Where can we email you the results? Please enter details below.
Submit
You can unsubscribe at any time.
You got a score of %%YOURSCORE%% out of %%TOTALSCORE%%
Aren’t you glad that is done? Don’t worry, it is nearly impossible for an organization to have a perfect score. If you have 75 or above, you are doing good and this book will help you improve on the foundation of technology that you have built.  If your score is between 50 and 75, you are well on your way to understanding what you need to do, but most likely need to build the infrastructure inside your organization to implement these pieces of your technology. If you are below 50, I’d suggest focusing on a particular area that you think you can get some quick progress on and start working on it.
Perfect - this is exactly what I meant when I talked about your personal voice coming through. Your readers will feel comfortable knowing that you are going to guide them every step of the way through a complex environment.

If you'd like to find out how to improve your company's cyber position, you can schedule a one-on-one assessment with a guide from Stimulus Technologies.
Schedule with Stimulus Technologies
%%CATEGORY_TOTAL_PERCENT%%
%%CATEGORY_TOTAL_NUMBER%%
[CATEGORY_TOTAL_PERCENT]
[CATEGORY_ONLY_PERCENT]
[CATEGORY_TOTAL_NUMBER]
Retake

YOUR TOTAL POINTS
0

  • About
  • Speaking
  • Podcast & Media
  • Resources
  • Press
  • Contact

©1995 – 2023 Stimulus Technologies Corp. All Rights Reserved. | Privacy / Disclaimer

StimulusTech.com /

Facebook Linkedin Youtube